Research Article

Application of a New Feature Generation Algorithm in Intrusion Detection System

Table 1

Classification of attack types.

Identify the typeMeaningSpecific classification identification

NormalNormal Record (Normal)Normal
AnormalDenial of Service Attack (DoS)back, land, neptune, pod, smurf, teardrop
Probing Attack (Probing)ipsweep, nmap, portsweep, satan, etc.
Remote to Local Attack (R2L)ftp_write, guess_passwd, imap, multihop, phf, spy, warezclient, warezmaster
User to Root Attack (U2R)buffer_overflow, loadmodule, perl, rootkit