Research Article

Network Intrusion Detection Method Based on PCA and Bayes Algorithm

Table 2

Content features of TCP connections.

FeaturesDescriptions

hotNumber of times to access system sensitive files and directories
num_failed_loginsThe number of failed login attempts
logged_inThe successful login is 1, otherwise 0
num_compromisedThe number of times the compromised condition appears
root_shell1 if the root shell was obtained, 0 otherwise
su_attemptedIf the “su root” command appears, it is 1, otherwise it is 0
num_rootThe number of root user access
num_file_creationsThe number of times the file is created
num_shellsThe number of times the shell command is used
num_access_filesThe number of access control files
num_outbound_cmdsThe number of outbound connections in an FTP session
is_hot_loginWhether the login belongs to the “hot” list
is_guest_login1 if guest login, 0 otherwise