Table 1 NF-ToN-IoT distribution.
Class | Count | Description |
|---|---|---|
Benign | 1550712 | Common benign flows |
Backdoor | 17247 | A mechanism that reacts to specifically created client applications to target systems with remote access |
DoS | 17717 | Attempting to prevent data access or availability by overwhelming a computer system’s resources. |
DDoS | 326345 | An attempt was made using several dispersed sources that are comparable to DoS. |
MITM | 1295 | “Man in the Middle” attacks allow hackers to eavesdrop on victim-host communications by inserting themselves in the midst of the conversation. |
Password | 156299 | Includes a range of techniques designed to recover passwords via sniffer or brute force methods. |
Ransomware | 142 | Attacks in which the decryption technique or key is sought as payment to decode data on a host |
Scanning | 21467 | This category, which encompasses several techniques for discovering hosts and networks, is often known as probing. |
XSS | 99944 | When hackers insert malicious code into web applications, they engage in cross-site scripting. |