-
Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are crucial for defending against network attacks.
-
Unlike the commonly-used KDDCUP99 outlier detection dataset, this dataset contains both benign and updated attack data, mimicking real-world scenarios, with an emphasis on generating realistic background traffic using the B-Profile system.
-
It includes network traffic analysis results with labeled flows and feature definitions.
-
It profiles the behavior of 25 users across various protocols like HTTP, HTTPS, FTP, SSH, and email.
The data was captured from July 3 to July 7, 2017, including benign traffic and various attacks (e.g., Brute Force, DoS, Heartbleed, Web Attack, Infiltration, Botnet, DDoS).
- Complete Network Configuration: Includes diverse OS and network devices.
- Complete Traffic: Involves a user profiling agent and different machines for victim and attack networks.
- Labelled Dataset: Detailed labels for benign and attack data.
- Complete Interaction: Covers internal LAN and internet communications.
- Complete Capture: Utilizes mirror port for full traffic capture.
- Available Protocols: Includes common protocols like HTTP, HTTPS, FTP, SSH, and email.
- Attack Diversity: Features common attacks as per the 2016 McAfee report.
- Heterogeneity: Traffic captured from the main Switch, including memory dumps and system calls.
- Feature Set: Over 80 network flow features extracted.
- MetaData: Comprehensive dataset description including time, attacks, flows, and labels.