Table 7 Undersampled data.
From: Towards advanced AI-based solutions for securing IoMT in smart health information systems
Feature 1 (source ID) | Feature 2 (protocol) | Feature 3 (packet size) | Feature 4 (flow duration) | Label (normal/malicious) |
|---|---|---|---|---|
1 | 0 | 120 | 500 | Normal |
5 | 1 | 250 | 900 | Normal |
2 | 1 | 150 | 600 | Malicious |
4 | 0 | 165 | 800 | Malicious |