Attack Types
S/N
Name
Type
1.
Back
dos
2.
buffer_overflow
u2r
3.
ftp_write
r2l
4.
guess_passwd
r2l
5.
imap
r2l
6.
ipsweep
probe
7.
land
dos
8.
loadmodule
u2r
9.
multihop
r2l
10.
neptune
dos
11.
nmap
probe
12.
perl
u2r
13.
phf
r2l
14.
pod
dos
15.
portsweep
probe
16.
rootkit
u2r
17.
satan
probe
18.
smurf
dos
19.
spy
r2l
20.
teardrop
dos
21.
warezclient
r2l
22.
warezmaster
r2l
Field Names
duration: continuous.
protocol_type: symbolic.
service: symbolic.
flag: symbolic.
src_bytes: continuous.
dst_bytes: continuous.
land: symbolic.
wrong_fragment: continuous.
urgent: continuous.
hot: continuous.
num_failed_logins: continuous.
logged_in: symbolic.
num_compromised: continuous.
root_shell: continuous.
su_attempted: continuous.
num_root: continuous.
num_file_creations: continuous.
num_shells: continuous.
num_access_files: continuous.
num_outbound_cmds: continuous.
is_host_login: symbolic.
is_guest_login: symbolic.
count: continuous.
srv_count: continuous.
serror_rate: continuous.
srv_serror_rate: continuous.
rerror_rate: continuous.