Research Article
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Table 3
Numerical coding for third dimensional character data.
| Internet service | Login | Hostnames | Ftp | Finger | ecr_i | Time | Systat |
| Coding | 0 | 2 | 5 | 8 | 10 | 11 | 15 | Internet service | Private | Netstat | domain_u | telnet | http | ftp_data | Other | Coding | 18 | 20 | 21 | 23 | 25 | 28 | 30 |
|
|