Table 3. Attack characteristic division.
| Attack type | Attack subtype | Total |
|---|---|---|
| DOS | back, land, neptune, pod, smurf, teardrop,apache2, mailbomb, processtable, udpstorm,worm | 11 |
| Probe | ipsweep, nmap, portsweep, satan, saint, mscan | 6 |
| U2R | buffer_overflow, loadmodule, perl, rootkit, sqlattack, xterm,ps | 7 |
| R2L | ftp_write, guess_passwd,httptunnel, imap, multihop, named,phf, spy, sendmail, snmpgetattack,warezclient, warezmaster, snmpguess,xlock,xsnoop | 15 |