Research Article

Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection

Table 1

Identification types of test data.

TypeMeaningClassification ID

NormalNormal recordNormal
DoSDenial of service attackBack, land, Neptune, pod, smurf, teardrop
ProbingSurveillance and other detection activitiespsweep, nmap, portsweep, satan
R2LFrom remote machine unauthorized accessftp_write, guess_passwd, imap, mul-tihop, phf, spy, warezclient, warez-master
U2RIllegal access by ordinary users to local superuser privilegesBuffer_overflow, loadmodule, perl, rootkit