Research Article

Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques

Table 2

Four categories of attack.

Attack categoryName of attack

Denial of service (DoS)teardrop, smurf, neptune, back, land, pod
Probesatan, nmap, ipsweep, portsweep
User to root (U2R)loadmodule, buffer_overflow, rootkit
Remote to local (R2L)multihop, phf, ftp_write, warezclient, imap, guess_passwd, warezmaster