Research Article
Integrating Traffics with Network Device Logs for Anomaly Detection
Table 3
The collection details for traffic data.
| | Type | Traffic Amount | Name |
| | Normal | 30 | N/A | | XSS | 6 | N/A | | Phishing | 5 | N/A | | HTTP botnets[20] | 7 | Virut, Sogou | | P2P botnets [21] | 13 | NSIS.ay, SMTP Spam, Zeus (C&C), UDP Storm, Zeus, Zero access, Weasel |
|
|