Research Article
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning
Table 6
Description of traffic characteristics.
| | Name | Description |
| | Protocol | Type of the protocol used | | Flow duration | Length of connection | | Flow Bytes (s) | Number of data bytes | | Flow Packets (s) | Number of data packets | | Flow IAT | Packets flow interarrival time | | Fwd IAT | Forward interarrival time | | Bwd IAT | Backward interarrival time | | Active time | The amount of time a flow was active before becoming idle | | Idle | The amount of time a flow was idle before becoming active |
|
|