Skip to main content

Table 16 Top 20 features for SQL Injection web attacks ranked by Filter-based techniques

From: A new feature popularity framework for detecting cyberattacks using popular features

Chi Squared

Information Gain

Information Gain Ratio

Fwd_IAT_Total

Fwd_Packets_s

Fwd_Packets_s

Idle_Max

Flow_Packets_s

Flow_Packets_s

Bwd_IAT_Total

Flow_IAT_Mean

Flow_IAT_Mean

Idle_Mean

Fwd_IAT_Mean

Fwd_IAT_Mean

Idle_Min

Fwd_IAT_Total

Fwd_IAT_Total

Fwd_IAT_Max

Bwd_Packets_s

Bwd_Packets_s

Fwd_IAT_Min

Flow_IAT_Max

Flow_IAT_Max

Fwd_IAT_Mean

Flow_IAT_Std

Flow_IAT_Std

Flow_IAT_Min

Fwd_IAT_Max

Fwd_IAT_Max

Flow_IAT_Mean

Fwd_IAT_Std

Fwd_IAT_Std

Flow_IAT_Max

Flow_Bytes_s

Flow_Bytes_s

PktLenVar

PktLenVar

PktLenVar

Bwd_IAT_Max

Packet_Length_Std

Packet_Length_Std

Bwd_IAT_Min

Bwd_IAT_Std

Bwd_IAT_Std

Active_Max

Bwd_IAT_Mean

Bwd_IAT_Mean

Flow_Bytes_s

FwdPktLenStd

FwdPktLenStd

Fwd_IAT_Std

Bwd_IAT_Total

Bwd_IAT_Total

Active_Mean

BwdPktLenStd

BwdPktLenStd

Idle_Std

Packet_Length_Mean

Packet_Length_Mean

Bwd_IAT_Mean

Max_Packet_Length

Max_Packet_Length