Research Article
Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques
Table 2
Four categories of attack.
| Attack category | Name of attack |
| Denial of service (DoS) | teardrop, smurf, neptune, back, land, pod | Probe | satan, nmap, ipsweep, portsweep | User to root (U2R) | loadmodule, buffer_overflow, rootkit | Remote to local (R2L) | multihop, phf, ftp_write, warezclient, imap, guess_passwd, warezmaster |
|
|