Research Article
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Table 1
Identification types of test data.
| | Type | Meaning | Classification ID |
| | Normal | Normal record | Normal | | DoS | Denial of service attack | Back, land, Neptune, pod, smurf, teardrop | | Probing | Surveillance and other detection activities | psweep, nmap, portsweep, satan | | R2L | From remote machine unauthorized access | ftp_write, guess_passwd, imap, mul-tihop, phf, spy, warezclient, warez-master | | U2R | Illegal access by ordinary users to local superuser privileges | Buffer_overflow, loadmodule, perl, rootkit |
|
|