当前位置:网站首页>Introduction to intrusion detection data set

Introduction to intrusion detection data set

2022-04-23 20:31:00 zjt597778912

KDDCup 99

NSL-KDD

UNSW-NB 15

Time :
  • Did not find , But no later than 2015 year
background :
  • UNSW-NB 15 The original network packets of the data set were generated by the network wide Laboratory of the Australian network security center IXIA PerfectStorm Tool created , It can be used to generate mixed data of modern normal activity and synthetic contemporary attack behavior . Use TCPDUMP Tool capture 100 GB The original flow ( for example ,PCAP file ).
The file is introduced
  • contain 2540044 Data records .
  • UNSW-NB15_1.csv:700000 strip
  • UNSW-NB15_2.csv:700000 strip
  • UNSW-NB15_3.csv:700000 strip
  • UNSW-NB15_4.csv:440044 strip
  • UNSW-NB15_GT.csv: Mark the table correctly (ground truth table)
  • UNSW-NB15_LIST_EVENTS.csv: List of events (the list of event file)
  • a part of training and testing set:
    • UNSW_NB15_training-set.csv:175341 strip
    • UNSW_NB15_testing-set.csv:82332 strip
Feature introduction
Label Introduction
  • ditto
Extended information

Kyoto

Time :
background :
The file is introduced
Feature introduction
Label Introduction
Extended information

WSN-DS

  • Put the official website first :
  • Download address :
Time :
background :
The file is introduced
Feature introduction
Label Introduction
Extended information

CICIDS 2017

  • Put the official website first :https://www.unb.ca/cic/datasets/ids-2017.html
  • Download address :
Time :
background :
The file is introduced
Feature introduction
Label Introduction
Extended information

CIDDS

  • Put the official website first :https://www.hs-coburg.de/index.php?id=927
  • Download address :
Time :
background :
The file is introduced
Feature introduction
Label Introduction
Extended information

Dataset set

  • Reference resources https://blog.csdn.net/Naristilia/article/details/103900130
  • From the data set compiled by the Canadian Institute of network security :https://www.unb.ca/cic/datasets/index.html
  • Data mining and network security resource network :http://users.cis.fiu.edu/~lpeng/
    • [ Intrusion detection ] DARPA Intrusion detection data set
    • [ Intrusion detection ] KDD Cup 99 Data sets
    • [ Intrusion detection ] NSL-KDD Data sets
    • [ Hacker attack data set ] Honeynet Data sets ( The data set includes data from 2000 year 4 Month to 2011 year 2 month , Cumulative 11 Months Snort Alarm data , About every month 60-3000 multiple Snort Alarm records , Its network consists of 8 individual IP Address through ISDN Connect to ISP)
    • [ Log data ] Challenge 2013 Data sets ( Provides a two-week running log of the internal network of a fictitious multinational company , Log types include 3 Kind of , Network traffic Netflow Log data and Big Brother Network health and status data , Logs include : First of all 、 Two week Netflow and Big Brother journal , Intrusion prevention system log data for the second week , Through log analysis, we can find out the anomalies in the network , The network contains about hosts and servers 1100 platform , The number of original logs is close to 10 GB, Number of records exceeds 9000 Line ten thousand )
    • Malware data set
  • Vizsec:https://vizsec.org/data/
  • At home 360Netlab:http://blog.netlab.360.com/tag/ddos/

版权声明
本文为[zjt597778912]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210550240921.html