Research Article
An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection
Table 5
Standardized methods of data.
| Standardization of protocol type data: protocol type (assignment) | TCP (1) | UDP (2) | ICMP (3) | Others (4) | | | |
| Standardization of service type data: service type (assignment) | http (1) | smtp (2) | Fingers (3) | Eco_i (4) | ftp_data (5) | ftp (6) | Domain_u (7) | Hostnames (8) | Imap4 (9) | mtp (10) | Netstat (11) | Private (12) | Systat (13) | Telnet (14) | ecr_i (15) | Time (16) | uucp (17) | Login (18) | urp_i (19) | Pop_3 (20) | Auth (21) | Other (21) | URP_I (22) | Others (23) | | | | |
| Standardization of property data: property type (assignment) | REJ (1) | S1 (2) | RSTO (3) | RSTR (4) | SO (5) | SH (6) | SF (7) | S2 (8) | RSTRSO (9) | Others (10) | | | | |
|
|