Research Article
PIoT Malicious Traffic Detection Method Based on GAN Sample Enhancement
Table 2
The malicious traffic feature set.
| Features | Description |
| Flow duration | The duration of flow | Total fwd packets | The number of packets from client to server | Flow Bytes/s | Packet bytes transmitted per second | Flow IAT min | The minimum interval arrival time of two flow | Bwd IAT min | The minimum interval arrival time of flow from server to client | Bwd PSH flags | The number of PSH flags from server to client | Bwd URG flags | The number of URG flags from server to client | Fwd Packets/s | The number of packets from client to server per second | Bwd Packets/s | The number of packets from server to client per second | Total backward packets | The number of packets from server to client | Fwd packet length min | The minimum length of the packet from client to server | | | | | FIN flag count | The count of packets with FIN flag | ACK flag count | The count of packets with ACK flag | URG flag count | The count of packets with URG flag | SYN flag count | The count of packets with SYN flag | CWE flag count | The count of packets with CWE flag | ECE flag count | The count of packets with ECE flag | Down/Up ratio | The ratio of down/Up | Avg fwd segment size | The average size of packets from client to server |
|
|