Skip to main content

Table 18 Top 20 features for XSS web attacks ranked by Filter-based techniques

From: A new feature popularity framework for detecting cyberattacks using popular features

Chi Squared

Information Gain

Information Gain Ratio

Bwd_IAT_Total

Fwd_Packets_s

Fwd_Packets_s

Fwd_IAT_Total

Flow_Packets_s

Flow_Packets_s

Idle_Min

Fwd_IAT_Mean

Fwd_IAT_Mean

Idle_Mean

Fwd_IAT_Total

Fwd_IAT_Total

Flow_IAT_Max

Flow_IAT_Mean

Flow_IAT_Mean

Fwd_IAT_Max

Flow_IAT_Std

Flow_IAT_Std

Idle_Max

Fwd_IAT_Std

Fwd_IAT_Std

Fwd_IAT_Mean

Fwd_IAT_Max

Fwd_IAT_Max

Fwd_IAT_Min

Flow_IAT_Max

Flow_IAT_Max

Flow_IAT_Min

Flow_Bytes_s

Flow_Bytes_s

Flow_IAT_Mean

Bwd_Packets_s

Bwd_Packets_s

Bwd_IAT_Max

PktLenVar

PktLenVar

TotLenFwdPkts

Packet_Length_Std

Packet_Length_Std

Subflow_Fwd_Bytes

Packet_Length_Mean

Packet_Length_Mean

PktLenVar

Average_Packet_Size

Average_Packet_Size

Subflow_Bwd_Bytes

FwdPktLenMean

FwdPktLenMean

TotLenBwdPkts

AvgFwdSegSize

AvgFwdSegSize

Bwd_IAT_Std

TotLenFwdPkts

TotLenFwdPkts

Fwd_IAT_Std

Subflow_Fwd_Bytes

Subflow_Fwd_Bytes

Bwd_IAT_Mean

Max_Packet_Length

Max_Packet_Length