feat: delete 1 file, create 1 file and update 1 file
Browse files- CSV/Monday-WorkingHours.pcap_ISCX.csv +0 -3
- Chart-Code.ipynb +0 -0
- README.md +61 -0
CSV/Monday-WorkingHours.pcap_ISCX.csv
DELETED
@@ -1,3 +0,0 @@
|
|
1 |
-
version https://git-lfs.github.com/spec/v1
|
2 |
-
oid sha256:b7a8f64fbcf533b39a58b8cc9574d2d7df3d44e8f126b55fee93002e278540a5
|
3 |
-
size 176927853
|
|
|
|
|
|
|
|
Chart-Code.ipynb
ADDED
The diff for this file is too large to render.
See raw diff
|
|
README.md
CHANGED
@@ -0,0 +1,61 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# CIC-IDC
|
2 |
+
|
3 |
+
|
4 |
+
|
5 |
+
This dataset is a dataset that sorts multiple tracks that are attacked by the network.
|
6 |
+
|
7 |
+
|
8 |
+
The data on that dataset are as follows.
|
9 |
+
|
10 |
+
|
11 |
+
|
12 |
+
## 자료
|
13 |
+
|
14 |
+
|
15 |
+
|
16 |
+
The types of Attacks are as follows.
|
17 |
+
|
18 |
+
- DDoS
|
19 |
+
- Web_Attack_�_Brute_Force
|
20 |
+
- Infiltration
|
21 |
+
- DoS_GoldenEye
|
22 |
+
- DoS_Hulk
|
23 |
+
- Heartbleed
|
24 |
+
- Bot
|
25 |
+
- DoS_Slowhttptest
|
26 |
+
- Web_Attack_�_XSS
|
27 |
+
- DoS_slowloris
|
28 |
+
- FTP-Patator
|
29 |
+
- SSH-Patator
|
30 |
+
- Web_Attack_�_Sql_Injection
|
31 |
+
- PortScan
|
32 |
+
|
33 |
+
|
34 |
+
|
35 |
+
The percentage of attack attempts is as follows.
|
36 |
+
![image-20230926151821430](/home/limmireu/.config/Typora/typora-user-images/image-20230926151821430.png)
|
37 |
+
|
38 |
+
|
39 |
+
|
40 |
+
Detailed Attack Rate Chart
|
41 |
+
|
42 |
+
<img src="/home/limmireu/.config/Typora/typora-user-images/image-20230926152655774.png" alt="image-20230926152655774" style="zoom:40%;" />
|
43 |
+
|
44 |
+
![image-20230926152729901](/home/limmireu/.config/Typora/typora-user-images/image-20230926152729901.png)
|
45 |
+
|
46 |
+
|
47 |
+
|
48 |
+
A dataset made up of .
|
49 |
+
|
50 |
+
|
51 |
+
In addition, the data set is configured with files as follows.
|
52 |
+
|
53 |
+
| File Name | the manner of attack | weight of attack (%) |
|
54 |
+
| ----------------------------------------------------------- | ------------------------------------------------------------ | ------------- |
|
55 |
+
| Friday-WorkingHours-Afternoon-DDos.pcap_ISCX.csv | DDoS | 56 |
|
56 |
+
| Tuesday-WorkingHours.pcap_ISCX.csv | FTP-Patator, SSH-Patator | 3 |
|
57 |
+
| Friday-WorkingHours-Afternoon-PortScan.pcap_ISCX.csv | PortScan | 55 |
|
58 |
+
| Thursday-WorkingHours-Afternoon-Infilteration.pcap_ISCX.csv | Infiltration | 0.01 |
|
59 |
+
| Wednesday-workingHours.pcap_ISCX.csv | DoS_Hulk, DoS_Slowhttptest, DoS_GoldenEye, Heartbleed, DoS_slowloris | 36 |
|
60 |
+
| Friday-WorkingHours-Morning.pcap_ISCX.csv | Bot | 1.02 |
|
61 |
+
| Thursday-WorkingHours-Morning-WebAttacks.pcap_ISCX.csv | Web_Attack_�_XSS, Web_Attack_�_Brute_Force, Web_Attack_�_Sql_Injection | 1.27 |
|