“…Attack categories conclude Fuzzers, Analysis, Backdoor, DoS, Exploit, Generic, Reconnaissance, Shellcode, and Worm. 7, dbytes (8), rate(9), sttl (10), dttl (11), sload (12), dload (13), sloss (14), dloss (15) Content features swin (16), dwin (17), stcpb (18), dtcpb (19), smean (20), dmean (21), trans_depth (22), res_bdy_len(23) Time features sintpkt (24), dintpkt (25), sjit (26), djit (27), tcprtt (28), synack (29), ackdat (30) Addition features ct_srv_src (31), ct_state_ttl(32), ct_dst_ltm (33), ct_src_dport_ltm(34), ct_dst_sport_ltm (35), ct_dst_src_ltm (36), is_ftp_login (37), ct_ftp_cmd (38), ct_flw_http_mthd(39), ct_src_ltm(40),ct_srv_dst(41),is_sm_ips_ports(42)…”