Research Article

PIoT Malicious Traffic Detection Method Based on GAN Sample Enhancement

Table 2

The malicious traffic feature set.

FeaturesDescription

Flow durationThe duration of flow
Total fwd packetsThe number of packets from client to server
Flow Bytes/sPacket bytes transmitted per second
Flow IAT minThe minimum interval arrival time of two flow
Bwd IAT minThe minimum interval arrival time of flow from server to client
Bwd PSH flagsThe number of PSH flags from server to client
Bwd URG flagsThe number of URG flags from server to client
Fwd Packets/sThe number of packets from client to server per second
Bwd Packets/sThe number of packets from server to client per second
Total backward packetsThe number of packets from server to client
Fwd packet length minThe minimum length of the packet from client to server
FIN flag countThe count of packets with FIN flag
ACK flag countThe count of packets with ACK flag
URG flag countThe count of packets with URG flag
SYN flag countThe count of packets with SYN flag
CWE flag countThe count of packets with CWE flag
ECE flag countThe count of packets with ECE flag
Down/Up ratioThe ratio of down/Up
Avg fwd segment sizeThe average size of packets from client to server