--- license: apache-2.0 datasets: - rdpahalavan/network-packet-flow-header-payload widget: - text: >- 14 89 125161 -1 80 46060 1500 1460 253 0 5 0 -1 29 39 25 28 17 20 40 45 39 56 50 41 59 42 42 58 47 37 55 40 30 51 51 37 55 47 40 57 45 32 62 32 30 50 31 26 50 71 68 103 86 93 132 43 52 89 42 34 48 40 34 45 42 32 51 42 31 40 64 38 32 182 151 122 72 65 74 66 48 63 50 40 59 52 42 61 61 46 60 68 42 60 63 49 63 56 53 63 71 78 92 60 54 66 60 59 68 60 52 63 62 60 65 58 65 75 45 39 66 38 31 44 40 31 45 41 28 47 43 32 54 45 33 55 42 28 48 39 32 40 31 31 44 39 31 55 54 45 63 60 51 55 57 47 62 125 112 96 154 139 111 113 104 89 133 126 100 161 144 123 157 135 117 87 68 69 103 81 71 183 163 128 177 159 128 113 108 94 59 41 58 81 59 66 95 73 65 149 142 115 152 135 115 159 139 116 168 157 127 101 84 81 56 35 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 tags: - Network Intrusion Detection - Cybersecurity - Network Packets --- This model was fine-tuned for classifying a network packet into one of the below categories. For details about the dataset used, [visit here](https://huggingface.co/datasets/rdpahalavan/network-packet-flow-header-payload). ```python ['Analysis', 'Backdoor', 'Bot', 'DDoS', 'DoS', 'DoS GoldenEye', 'DoS Hulk', 'DoS SlowHTTPTest', 'DoS Slowloris', 'Exploits', 'FTP Patator', 'Fuzzers', 'Generic', 'Heartbleed', 'Infiltration', 'Normal', 'Port Scan', 'Reconnaissance', 'SSH Patator', 'Shellcode', 'Web Attack - Brute Force', 'Web Attack - SQL Injection', 'Web Attack - XSS', 'Worms'] ```