Research Article
Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network
Table 3
Feature vector table of cognitive feature data set.
| Parameter | Feature | Parameter | Feature | Parameter | Feature |
| F1 | protocol_type | F13 | num_file_creations | F25 | diff_srv_rate | F2 | Service | F14 | num_access_files | F26 | srv_diff_host_rate | F3 | Flag | F15 | num_outbound_cmds | F27 | idst_host_count | F4 | Land | F16 | is_hot_login | F28 | dst_host_srv_count | F5 | wrong_fragment | F17 | is_guest_login | F29 | dst_host_same_srv_rate | F6 | Urgent | F18 | Count | F30 | dst_host_diff_srv_rate | F7 | Hot | F19 | srv_count | F31 | dst_host_same_src_port_rate | F8 | num_failed_logins | F20 | serror_rate | F32 | dst_host_srv_diff_host_rate | F9 | logged_in | F21 | srv_serror_rate | F33 | dst_host_serror_rate | F10 | num_compromised | F22 | rerror_rate | F34 | dst_host_srv_serror_rate | F11 | root_shell | F23 | srv_rerror_rate | F35 | dst_host_rerror_rate | F12 | dst_host_rerror_rate | F24 | same_srv_rate | F36 | dst_host_srv_rerror_rate |
|
|