Research Article

Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network

Table 2

Feature vector table of covert DOH data set.

ParameterFeatureParameterFeature

F1Number of flow bytes sentF15Mode packet time
F2Rate of flow bytes sentF16Variance of packet time
F3Number of flow bytes receivedF17Standard deviation of packet time
F4Rate of flow bytes receivedF18Coefficient of variation of packet time
F5Mean packet lengthF19Skew from median packet time
F6Median packet lengthF20Skew from mode packet time
F7Mode packet lengthF21Mean request/response time difference
F8Variance of packet lengthF22Median request/response time difference
F9Standard deviation of packet lengthF23Mode request/response time difference
F10Coefficient of variation of packet lengthF24Variance of request/response time difference
F11Skew from median packet lengthF25Standard deviation of request/response time difference
F12Skew from mode packet lengthF26Coefficient of variation of request/response time difference
F13Mean packet timeF27Skew from median request/response time difference
F14Median packet timeF28Skew from mode request/response time difference