Baselight

Comprehensive Malware Datasets

Anomaly incoming traffic

@kaggle.paytonjabir_comprehensive_malware_datasets

Loading...
Loading...

About this Dataset

Comprehensive Malware Datasets

This dataset containing a wide range of invasions simulated in a research organization was submitted to be audited. By imitating a typical Ecommerce function on the internet, it developed an environment for obtaining raw TCP/IP dump data for a network. The internet was concentrated as if it were a real setting, and various attacks were launched. A connection is a series of TCP packets that begin and stop at a specific time interval and allow data to flow from a source IP address to a target IP address using a well-defined protocol. In addition, each link is classified as either normal or an attack. Each connection record is around 100 bytes long.

For each TCP/IP connection, 19 quantitative and qualitative features are obtained from normal and attack data (2 qualitative and 17 quantitative features). The class variable has categories:
• Normal
• Buffer overflow
• IPsweep
• rootkit
• SQL attack
• worm

Tables

Malware Analysis

@kaggle.paytonjabir_comprehensive_malware_datasets.malware_analysis
  • 662.33 kB
  • 60,937 rows
  • 19 columns
Loading...
CREATE TABLE malware_analysis (
  "n_0" BIGINT  -- 0,
  "udp" VARCHAR,
  "private" VARCHAR,
  "sf" VARCHAR,
  "n_105" BIGINT  -- 105,
  "n_146" BIGINT  -- 146,
  "n_1" BIGINT  -- 1,
  "n_1_1" BIGINT  -- 1.1,
  "n_1_2" DOUBLE  -- 1.2,
  "n_0_1" DOUBLE  -- 0.1,
  "n_0_2" DOUBLE  -- 0.2,
  "n_255" BIGINT  -- 255,
  "n_254" BIGINT  -- 254,
  "n_1_3" DOUBLE  -- 1.3,
  "n_0_01" DOUBLE  -- 0.01,
  "n_0_3" DOUBLE  -- 0.3,
  "n_0_4" DOUBLE  -- 0.4,
  "n_0_5" DOUBLE  -- 0.5,
  "normal" VARCHAR  -- Normal.
);

Share link

Anyone who has the link will be able to view this.