Research Article

Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things

Table 2

Selected features of the dataset.

TermTypesDescription

SrrcipNominalsIP addresses of sources
DstippNominalsIP addresses of destinations
DsportsIntegersPorts numbers of destinations
ProtolNominalsProtocols for transactions
DuraFloatOverall duration records
DbytessIntegersTransactional byte of destinations to sources
iss_ftpp_loginBinaryIf ftp sessions were accessed by users and passwords, hence 1 else 0.
cts_srsv_dsstIntegersTotal link that includes the similar services (14) and addresses of destinations (3) in 100 links depended on last times (26)
cts_dsst_ltsmIntegersTotal links of same addresses of destinations (3) in 100 links depended on the previous times (26)
cts_src_ ltsmIntegersTotal link of same addresses of sources (1) in 100 links depended on the previous times (26)
cts_ssrc_dsport_ltsmIntegersTotal link of same addresses of sources (1) and destination ports (4) in 100 links according to the past times (26)