Research Article

Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network

Table 3

Feature vector table of cognitive feature data set.

ParameterFeatureParameterFeatureParameterFeature

F1protocol_typeF13num_file_creationsF25diff_srv_rate
F2ServiceF14num_access_filesF26srv_diff_host_rate
F3FlagF15num_outbound_cmdsF27idst_host_count
F4LandF16is_hot_loginF28dst_host_srv_count
F5wrong_fragmentF17is_guest_loginF29dst_host_same_srv_rate
F6UrgentF18CountF30dst_host_diff_srv_rate
F7HotF19srv_countF31dst_host_same_src_port_rate
F8num_failed_loginsF20serror_rateF32dst_host_srv_diff_host_rate
F9logged_inF21srv_serror_rateF33dst_host_serror_rate
F10num_compromisedF22rerror_rateF34dst_host_srv_serror_rate
F11root_shellF23srv_rerror_rateF35dst_host_rerror_rate
F12dst_host_rerror_rateF24same_srv_rateF36dst_host_srv_rerror_rate