Skip to main content

Table 14 Top 20 features for Brute Force Web Attacks ranked by Filter-based techniques

From: A new feature popularity framework for detecting cyberattacks using popular features

Chi Squared

Information Gain

Information Gain Ratio

Idle_Std

Fwd_Packets_s

Fwd_Packets_s

Fwd_IAT_Total

Flow_Packets_s

Flow_Packets_s

Flow_IAT_Std

Fwd_IAT_Mean

Fwd_IAT_Mean

Idle_Max

Flow_IAT_Mean

Flow_IAT_Mean

Flow_IAT_Max

Fwd_IAT_Total

Fwd_IAT_Total

Fwd_IAT_Std

Flow_IAT_Std

Flow_IAT_Std

Active_Min

Fwd_IAT_Std

Fwd_IAT_Std

Fwd_IAT_Max

Flow_IAT_Max

Flow_IAT_Max

Active_Mean

Flow_Bytes_s

Flow_Bytes_s

Bwd_IAT_Max

Fwd_IAT_Max

Fwd_IAT_Max

Bwd_IAT_Total

Packet_Length_Mean

Packet_Length_Mean

Flow_IAT_Mean

Average_Packet_Size

Average_Packet_Size

Fwd_IAT_Mean

FwdPktLenMean

FwdPktLenMean

Active_Max

AvgFwdSegSize

AvgFwdSegSize

Idle_Min

Max_Packet_Length

Max_Packet_Length

Bwd_IAT_Mean

Bwd_Packets_s

Bwd_Packets_s

Bwd_IAT_Min

TotLenFwdPkts

TotLenFwdPkts

TotLenFwdPkts

Subflow_Fwd_Bytes

Subflow_Fwd_Bytes

Subflow_Fwd_Bytes

Packet_Length_Std

Packet_Length_Std

Bwd_IAT_Std

PktLenVar

PktLenVar