All data were randomly selected from the CSE-CIC-IDS2018 dataset. The data fields were censored after going through the analysis and 64 valid features were retained.

There are 5 types of data, they are Benign, DoS, DDoS, Botnet and Infiltration.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Wang Zhen, "A subset from CSE-CIC-IDS2018", IEEE Dataport, 2023. [Online]. Available: http://dx.doi.org/10.21227/2c0c-dp31. Accessed: Apr. 22, 2024.
@data{2c0c-dp31-23,
doi = {10.21227/2c0c-dp31},
url = {http://dx.doi.org/10.21227/2c0c-dp31},
author = {Wang Zhen },
publisher = {IEEE Dataport},
title = {A subset from CSE-CIC-IDS2018},
year = {2023} }
TY - DATA
T1 - A subset from CSE-CIC-IDS2018
AU - Wang Zhen
PY - 2023
PB - IEEE Dataport
UR - 10.21227/2c0c-dp31
ER -
Wang Zhen. (2023). A subset from CSE-CIC-IDS2018. IEEE Dataport. http://dx.doi.org/10.21227/2c0c-dp31
Wang Zhen, 2023. A subset from CSE-CIC-IDS2018. Available at: http://dx.doi.org/10.21227/2c0c-dp31.
Wang Zhen. (2023). "A subset from CSE-CIC-IDS2018." Web.
1. Wang Zhen. A subset from CSE-CIC-IDS2018 [Internet]. IEEE Dataport; 2023. Available from : http://dx.doi.org/10.21227/2c0c-dp31
Wang Zhen. "A subset from CSE-CIC-IDS2018." doi: 10.21227/2c0c-dp31