Research Article
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Table 1
Identification types of test data.
| Type | Meaning | Classification ID |
| Normal | Normal record | Normal | DoS | Denial of service attack | Back, land, Neptune, pod, smurf, teardrop | Probing | Surveillance and other detection activities | psweep, nmap, portsweep, satan | R2L | From remote machine unauthorized access | ftp_write, guess_passwd, imap, mul-tihop, phf, spy, warezclient, warez-master | U2R | Illegal access by ordinary users to local superuser privileges | Buffer_overflow, loadmodule, perl, rootkit |
|
|