Smart-Defender Dataset

This work intend to identify characteristics in network traffic that are able to distinguish the normal network behavior from denial of service attacks. One way to classify anomalous traffic is the data analysis of the packets header. This dataset contains labeled examples of normal traffic (23.088 instances), TCP Flood attacks (14.988 instances), UDP Flood (6.894 instances), HTTP Flood (347 instances) and HTTP Slow (183 instances) distributed in 73 numeric variables.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

Documentation: 
AttachmentSize
Binary Data Dataset description5.9 KB
[1] , "Smart-Defender Dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/wke2-ch26. Accessed: Jun. 20, 2019.
@data{wke2-ch26-19,
doi = {10.21227/wke2-ch26},
url = {http://dx.doi.org/10.21227/wke2-ch26},
author = { },
publisher = {IEEE Dataport},
title = {Smart-Defender Dataset},
year = {2019} }
TY - DATA
T1 - Smart-Defender Dataset
AU -
PY - 2019
PB - IEEE Dataport
UR - 10.21227/wke2-ch26
ER -
. (2019). Smart-Defender Dataset. IEEE Dataport. http://dx.doi.org/10.21227/wke2-ch26
, 2019. Smart-Defender Dataset. Available at: http://dx.doi.org/10.21227/wke2-ch26.
. (2019). "Smart-Defender Dataset." Web.
1. . Smart-Defender Dataset [Internet]. IEEE Dataport; 2019. Available from : http://dx.doi.org/10.21227/wke2-ch26
. "Smart-Defender Dataset." doi: 10.21227/wke2-ch26