Advances, Systems and Applications
From: Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
Destination Port | Bwd Packet Length Std | Packet Length Max | Fwd Act Data Packets |
---|---|---|---|
Flow Duration | Flow IAT Max | Down/Up Ratio | Active Mean |
Total Fwd Packets | Fwd IAT Total | Subflow Fwd Packets | Active Min |
Total Backward Packets | Fwd IAT Max | Subflow Fwd Bytes | Idle Mean |
Fwd Packets Length Total | Bwd IAT Min | Subflow Bwd Packets | Idle Std |
Bwd Packets Length Total | Fwd Header Length | Subflow Bwd Bytes | Idle Max |
Bwd Packet Length Max | Bwd Header Length | Init Bwd Win Bytes | Idle Min |