Difference between revisions of "Datasets"

From Security Unileon
Line 9: Line 9:
 
:'''[2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack'''
 
:'''[2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack'''
 
::* https://doi.org/10.5281/zenodo.4106738
 
::* https://doi.org/10.5281/zenodo.4106738
 +
  
  
 
:'''[3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack'''
 
:'''[3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack'''
 
::* https://doi.org/10.5281/zenodo.4600638
 
::* https://doi.org/10.5281/zenodo.4600638
 +
 +
 +
 +
:'''[4] Netflow data with sampling 1/1000 for test . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849356
 +
 +
 +
 +
:'''[5] Netflow data with sampling 1/500 for training . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849306
 +
 +
 +
 +
:'''[6] Netflow data with sampling 1/500 for test . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849329
 +
 +
 +
 +
:'''[7] Netflow data with sampling 1/250 for training . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849288
 +
 +
 +
 +
:'''[8] Netflow data with sampling 1/250 for test . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849262
 +
 +
 +
 +
:'''[9] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849375
 +
 +
 +
 +
:'''[10] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack'''
 +
::* https://doi.org/10.5281/zenodo.5849375
 +
 +
 +
:'''[11] Netflow data without sampling SQLIA for training . 50% Bening traffic, 50% SQL Injection Attack'''
 +
::* https://doi.org/10.5281/zenodo.5849375
 +
 +
 +
:'''[12] Netflow data without sampling SQLIA for test . 50% Bening traffic, 50% SQL Injection Attack'''
 +
::* https://doi.org/10.5281/zenodo.6906911

Revision as of 08:46, 28 November 2022

NetFlow


[1] Netflow data without sampling for training. 50% Bening traffic, 50% Scan ports attack


[2] Netflow data without sampling for validation. 50% Bening traffic, 50% Slow Scan ports attack


[3] Netflow data with sampling 1/1000 for training . 50% Bening traffic, 50% Scan ports attack


[4] Netflow data with sampling 1/1000 for test . 50% Bening traffic, 50% Scan ports attack


[5] Netflow data with sampling 1/500 for training . 50% Bening traffic, 50% Scan ports attack


[6] Netflow data with sampling 1/500 for test . 50% Bening traffic, 50% Scan ports attack


[7] Netflow data with sampling 1/250 for training . 50% Bening traffic, 50% Scan ports attack


[8] Netflow data with sampling 1/250 for test . 50% Bening traffic, 50% Scan ports attack


[9] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack


[10] Netflow data with sampling 1/1000 collected from RedCAYLE . 50% Bening traffic, 50% Scan ports attack


[11] Netflow data without sampling SQLIA for training . 50% Bening traffic, 50% SQL Injection Attack


[12] Netflow data without sampling SQLIA for test . 50% Bening traffic, 50% SQL Injection Attack