Research Article
Application of a New Feature Generation Algorithm in Intrusion Detection System
Table 1
Classification of attack types.
| Identify the type | Meaning | Specific classification identification |
| Normal | Normal Record (Normal) | Normal | Anormal | Denial of Service Attack (DoS) | back, land, neptune, pod, smurf, teardrop | Probing Attack (Probing) | ipsweep, nmap, portsweep, satan, etc. | Remote to Local Attack (R2L) | ftp_write, guess_passwd, imap, multihop, phf, spy, warezclient, warezmaster | User to Root Attack (U2R) | buffer_overflow, loadmodule, perl, rootkit |
|
|