Research Article
Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things
Table 2
Selected features of the dataset.
| Term | Types | Description |
| Srrcip | Nominals | IP addresses of sources | Dstipp | Nominals | IP addresses of destinations | Dsports | Integers | Ports numbers of destinations | Protol | Nominals | Protocols for transactions | Dura | Float | Overall duration records | Dbytess | Integers | Transactional byte of destinations to sources | iss_ftpp_login | Binary | If ftp sessions were accessed by users and passwords, hence 1 else 0. | cts_srsv_dsst | Integers | Total link that includes the similar services (14) and addresses of destinations (3) in 100 links depended on last times (26) | cts_dsst_ltsm | Integers | Total links of same addresses of destinations (3) in 100 links depended on the previous times (26) | cts_src_ ltsm | Integers | Total link of same addresses of sources (1) in 100 links depended on the previous times (26) | cts_ssrc_dsport_ltsm | Integers | Total link of same addresses of sources (1) and destination ports (4) in 100 links according to the past times (26) |
|
|