Advances, Systems and Applications
From: Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
‘Destination Port’ | ‘Total Fwd Packets’ | ‘Bwd Packet Length Std’ | ‘Flow IAT Min’ | ‘Fwd Header Length’ |
---|---|---|---|---|
‘Flow IAT Min’ | ‘Subflow Fwd Packets’ | ‘Bwd IAT Total’ | ‘Bwd IAT Std’ | ‘Down/Up Ratio’ |