Skip to main content
. Author manuscript; available in PMC: 2021 Jul 20.
Published in final edited form as: Int J Netw Secur Appl. 2020 Jan;12(1):1–18. doi: 10.5121/ijnsa.2020.12101

Table 1:

Different types of Attack from Kddcup 99 Datasets [1]

DOS Probe R2L U2R
Back Nmap Spy Buffer overflow
Land Portsweep Phf Rootkit
Neptune Ipsweep Multihop Loadmodule
Pod Satan ftp write Perl
Smurf Imap
Teardrop Warezmaster
Guess passwd