--- task_categories: - feature-extraction tags: - code --- # CIC-IDS This dataset is a dataset that sorts multiple tracks that are attacked by the network. The data on that dataset are as follows. ## 자료 The types of Attacks are as follows. - DDoS - Web_Attack_�_Brute_Force - Infiltration - DoS_GoldenEye - DoS_Hulk - Heartbleed - Bot - DoS_Slowhttptest - Web_Attack_�_XSS - DoS_slowloris - FTP-Patator - SSH-Patator - Web_Attack_�_Sql_Injection - PortScan The percentage of attack attempts is as follows. ![image-20230926151821430](./image-20230926151821430.png) Detailed Attack Rate Chart image-20230926152655774 ![image-20230926152729901](./image-20230926152729901.png) A dataset made up of . In addition, the data set is configured with files as follows. | File Name | the manner of attack | weight of attack (%) | | ----------------------------------------------------------- | ------------------------------------------------------------ | ------------- | | Friday-WorkingHours-Afternoon-DDos.pcap_ISCX.csv | DDoS | 56 | | Tuesday-WorkingHours.pcap_ISCX.csv | FTP-Patator, SSH-Patator | 3 | | Friday-WorkingHours-Afternoon-PortScan.pcap_ISCX.csv | PortScan | 55 | | Thursday-WorkingHours-Afternoon-Infilteration.pcap_ISCX.csv | Infiltration | 0.01 | | Wednesday-workingHours.pcap_ISCX.csv | DoS_Hulk, DoS_Slowhttptest, DoS_GoldenEye, Heartbleed, DoS_slowloris | 36 | | Friday-WorkingHours-Morning.pcap_ISCX.csv | Bot | 1.02 | | Thursday-WorkingHours-Morning-WebAttacks.pcap_ISCX.csv | Web_Attack_�_XSS, Web_Attack_�_Brute_Force, Web_Attack_�_Sql_Injection | 1.27 | - License The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (GeneratedLabelledFlows.zip) and CSV files for machine and deep learning purpose (MachineLearningCSV.zip) are publicly available for researchers. If you are using our dataset, you should cite our related paper which outlining the details of the dataset and its underlying principles: Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018