Identification of effective network features for probing attack detection | IEEE Conference Publication | IEEE Xplore