From: An approach to the correlation of security events based on machine learning techniques
Attack name | Category | Details | Total instances | DARPA challenge | Bayesian classifier |
---|---|---|---|---|---|
ipsweep | Probe | Stealthy | 4 | 0 | 4 |
lsdomain | Probe | Stealthy | 2 | 1 | 2 |
portsweep | Probe | Stealthy | 11 | 3 | 8 |
queso | Probe | New | 4 | 0 | 4 |
ncftp | R2L | New | 5 | 0 | 1 |
netbus | R2L | New-windows | 3 | 1 | 3 |
snmpget | R2L | Old | 4 | 0 | 4 |
ntfsdos | U2R | New-windows | 3 | 1 | 3 |