Skip to main content

Advertisement

Table 4 Detection of new and stealthy attacks

From: An approach to the correlation of security events based on machine learning techniques

Attack name Category Details Total instances DARPA challenge Bayesian classifier
ipsweep Probe Stealthy 4 0 4
lsdomain Probe Stealthy 2 1 2
portsweep Probe Stealthy 11 3 8
queso Probe New 4 0 4
ncftp R2L New 5 0 1
netbus R2L New-windows 3 1 3
snmpget R2L Old 4 0 4
ntfsdos U2R New-windows 3 1 3