Research Article
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Table 1
The CIDDS dataset attributes [
34].
| | No. | Feature name | Feature description |
| | 1 | Src IP | IP address of the source node | | 2 | Src port | Port of the source node | | 3 | Dest IP | IP address of the destination node | | 4 | Dest port | Port of the destination node | | 5 | Proto | Protocol | | 6 | Data are first seen | Start time flow is first seen | | 7 | Duration | Flow period | | 8 | Bytes | Conveyed bytes | | 9 | Packets | Conveyed packets | | 10 | Flags | TCP flags | | 11 | Attack description | Additional information about the attack | | 12 | Attack type | Type of attack | | 13 | Attack ID | Unique attack ID | | 14 | Class | Category or label of the instance |
|
|