Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Table 3

The collection details for traffic data.

TypeTraffic Amount Name

Normal30N/A
XSS6N/A
Phishing5N/A
HTTP botnets[20]7Virut, Sogou
P2P botnets [21]13NSIS.ay, SMTP Spam, Zeus (C&C), UDP Storm, Zeus, Zero access, Weasel