Advances, Systems and Applications
From: A Transformer-based network intrusion detection approach for cloud security
Attack Type | Attack Description | Number of Attack |
---|---|---|
Benign | Normal. | 10856019 |
Botnet | By infecting a large number of hosts with bot program viruses, a one-to-many control network is formed between the controller and the infected hosts. | 144535 |
Infiltration | Exploit an application vulnerability to execute a backdoor on the victim’s computer, using the victim’s computer to scan the internal network and carry out an attack on other computers. | 144336 |
DDoS Attack | Multiple distributed servers are used to send requests to the target, resulting in responses that affect correct and legitimate requests. | 775955 |
DoS Attack | Attackers overload the system by carrying out a large number of attacks in a short period of time, making legitimate requests unresponsive. | 196631 |
Web Attack | Web programs scan websites for attacks on vulnerable sites, such as SQL injection. | 94101 |
Brute-force Attack | A common form of attack that uses programs to crack passwords by brute force, often to gain unauthorized access. | 884 |