Baselight

Malware Detection In Network Traffic Data

Unveiling Network Behaviors: A Deep Dive into Connection Logs.

@kaggle.agungpambudi_network_malware_detection_connection_analysis

Loading...
Loading...

About this Dataset

Malware Detection In Network Traffic Data

To cite the dataset please reference it as “Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22th. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga. https://www.stratosphereips.org/datasets-iot23


This dataset includes labels that explain the linkages between flows connected with harmful or possibly malicious activity to provide network malware researchers and analysts with more thorough information. These labels were painstakingly created at the Stratosphere labs using malware capture analysis.

We present a concise explanation of the labels used for the identification of malicious flows, based on manual network analysis, below:

Attack: This label signifies the occurrence of an attack originating from an infected device directed towards another host. Any flow that endeavors to exploit a vulnerable service, discerned through payload and behavioral analysis, falls under this classification. Examples include brute force attempts on telnet logins or header-based command injections in GET requests.

Benign: The "Benign" label denotes connections where no suspicious or malicious activities have been detected.

C&C (Command and Control): This label indicates that the infected device has established a connection with a Command and Control server. This observation is rooted in the periodic nature of connections or activities such as binary downloads or the exchange of IRC-like or decoded commands.

DDoS (Distributed Denial of Service): "DDoS" is assigned when the infected device is actively involved in a Distributed Denial of Service attack, identifiable by the volume of flows directed towards a single IP address.

FileDownload: This label signifies that a file is being downloaded to the infected device. It is determined by examining connections with response bytes exceeding a specified threshold (typically 3KB or 5KB), often in conjunction with known suspicious destination ports or IPs associated with Command and Control servers.

HeartBeat: "HeartBeat" designates connections where packets serve the purpose of tracking the infected host by the Command and Control server. Such connections are identified through response bytes below a certain threshold (typically 1B) and exhibit periodic similarities. This is often associated with known suspicious destination ports or IPs linked to Command and Control servers.

Mirai: This label is applied when connections exhibit characteristics resembling those of the Mirai botnet, based on patterns consistent with common Mirai attack profiles.

Okiru: Similar to "Mirai," the "Okiru" label is assigned to connections displaying characteristics of the Okiru botnet. The parameters for this label are the same as for Mirai, but Okiru is a less prevalent botnet family.

PartOfAHorizontalPortScan: This label is employed when connections are involved in a horizontal port scan aimed at gathering information for potential subsequent attacks. The labeling decision hinges on patterns such as shared ports, similar transmitted byte counts, and multiple distinct destination IPs among the connections.

Torii: The "Torii" label is used when connections exhibit traits indicative of the Torii botnet, with labeling criteria similar to those used for Mirai, albeit in the context of a less common botnet family.

Field Name Description Type
ts The timestamp of the connection event. time
uid A unique identifier for the connection. string
id.orig_h The source IP address. addr
id.orig_p The source port. port
id.resp_h The destination IP address. addr
id.resp_p The destination port. port
proto The network protocol used (e.g., 'tcp'). enum
service The service associated with the connection. string
duration The duration of the connection. interval
orig_bytes The number of bytes sent from the source to the destination. count
resp_bytes The number of bytes sent from the destination to the source. count
conn_state The state of the connection. string
local_orig Indicates whether the connection is considered local or not. bool
local_resp Indicates whether the connection is considered local or not. bool
missed_bytes The number of missed bytes in the connection. count
history A history of connection states. string
orig_pkts The number of packets sent from the source to the destination. count
orig_ip_bytes The number of IP bytes sent from the source to the destination. count
resp_pkts The number of packets sent from the destination to the source. count
resp_ip_bytes The number of IP bytes sent from the destination to the source. count
tunnel_parents Indicates if this connection is part of a tunnel. set[string]
label A label associated with the connection (e.g., 'Malicious' or 'Benign'). string
detailed-label A more detailed description or label for the connection. string

Tables

Ctu Iot Malware Capture 1–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_1_1conn_log_labeled
  • 42.79 MB
  • 1008748 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_1_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 20–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_20_1conn_log_labeled
  • 131.31 KB
  • 3209 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_20_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 21–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_21_1conn_log_labeled
  • 138.91 KB
  • 3286 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_21_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 3–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_3_1conn_log_labeled
  • 6.04 MB
  • 156103 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_3_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 34–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_34_1conn_log_labeled
  • 772.69 KB
  • 23145 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_34_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 35–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_35_1conn_log_labeled
  • 377.65 MB
  • 10447787 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_35_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 42–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_42_1conn_log_labeled
  • 201.39 KB
  • 4426 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_42_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 44–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_44_1conn_log_labeled
  • 24.23 KB
  • 237 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_44_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 48–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_48_1conn_log_labeled
  • 122.45 MB
  • 3394338 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_48_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 60–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_60_1conn_log_labeled
  • 102.61 MB
  • 3581028 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_60_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 8–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_8_1conn_log_labeled
  • 381.11 KB
  • 10403 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_8_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" BIGINT,
  "id_resp_h" VARCHAR,
  "id_resp_p" BIGINT,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" BIGINT,
  "history" VARCHAR,
  "orig_pkts" BIGINT,
  "orig_ip_bytes" BIGINT,
  "resp_pkts" BIGINT,
  "resp_ip_bytes" BIGINT,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Ctu Iot Malware Capture 9–1conn Log Labeled

@kaggle.agungpambudi_network_malware_detection_connection_analysis.ctu_iot_malware_capture_9_1conn_log_labeled
  • 245.43 MB
  • 6378293 rows
  • 23 columns
Loading...

CREATE TABLE ctu_iot_malware_capture_9_1conn_log_labeled (
  "ts" DOUBLE,
  "uid" VARCHAR,
  "id_orig_h" VARCHAR,
  "id_orig_p" DOUBLE,
  "id_resp_h" VARCHAR,
  "id_resp_p" DOUBLE,
  "proto" VARCHAR,
  "service" VARCHAR,
  "duration" VARCHAR,
  "orig_bytes" VARCHAR,
  "resp_bytes" VARCHAR,
  "conn_state" VARCHAR,
  "local_orig" VARCHAR,
  "local_resp" VARCHAR,
  "missed_bytes" DOUBLE,
  "history" VARCHAR,
  "orig_pkts" DOUBLE,
  "orig_ip_bytes" DOUBLE,
  "resp_pkts" DOUBLE,
  "resp_ip_bytes" DOUBLE,
  "tunnel_parents" VARCHAR,
  "label" VARCHAR,
  "detailed_label" VARCHAR
);

Share link

Anyone who has the link will be able to view this.