The following is a list of
figures for attack distribution of
CIDD Data Set
Figure1 shows the attack
distribution in the training data ( Solaris BSM,
windows audits and TCP-dump data)
Figure 1
Figure
2 show the
Masquerade attacks distribution in week 6 of
Part1and the two testing weeks of part2