Research Article
Detection of DDoS Vulnerability in Cloud Computing Using the Perplexed Bayes Classifier
Table 2
Features of the data used in the data set [
32ā
34].
| List of features of the data |
| Duration | logged_in | Count | dst_host_same_srv_rate | protocol_type | num_compromised | srv_count | dst_host_diff_srv_rate | Service | root_shell | serror_rate | dst_host_same_src_port_rate | Flag | su_attempted | srv_serror_rate | dst_host_srv_diff_host_rate | src_bytes | num_root | rerror_rate | dst_host_serror_rate | dst_bytes | num_file_creations | srv_rerror_rate | dst_host_srv_serror_rate | Land | num_shells | same_srv_rate | dst_host_rerror_rate | wrong_fragment | num_access_files | diff_srv_rate | dst_host_srv_rerror_rate | Urgent | num_outbound_cmds | srv_diff_host_rate | Label | Hot | is_host_login | dst_host_count | Severity | num_failed_logins | is_guest_login | dst_host_srv_count | ā |
|
|