Comprehensive Malware Datasets
Anomaly incoming traffic
@kaggle.paytonjabir_comprehensive_malware_datasets
Anomaly incoming traffic
@kaggle.paytonjabir_comprehensive_malware_datasets
This dataset containing a wide range of invasions simulated in a research organization was submitted to be audited. By imitating a typical Ecommerce function on the internet, it developed an environment for obtaining raw TCP/IP dump data for a network. The internet was concentrated as if it were a real setting, and various attacks were launched. A connection is a series of TCP packets that begin and stop at a specific time interval and allow data to flow from a source IP address to a target IP address using a well-defined protocol. In addition, each link is classified as either normal or an attack. Each connection record is around 100 bytes long.
For each TCP/IP connection, 19 quantitative and qualitative features are obtained from normal and attack data (2 qualitative and 17 quantitative features). The class variable has categories:
• Normal
• Buffer overflow
• IPsweep
• rootkit
• SQL attack
• worm
CREATE TABLE malware_analysis (
"n_0" BIGINT -- 0,
"udp" VARCHAR,
"private" VARCHAR,
"sf" VARCHAR,
"n_105" BIGINT -- 105,
"n_146" BIGINT -- 146,
"n_1" BIGINT -- 1,
"n_1_1" BIGINT -- 1.1,
"n_1_2" DOUBLE -- 1.2,
"n_0_1" DOUBLE -- 0.1,
"n_0_2" DOUBLE -- 0.2,
"n_255" BIGINT -- 255,
"n_254" BIGINT -- 254,
"n_1_3" DOUBLE -- 1.3,
"n_0_01" DOUBLE -- 0.01,
"n_0_3" DOUBLE -- 0.3,
"n_0_4" DOUBLE -- 0.4,
"n_0_5" DOUBLE -- 0.5,
"normal" VARCHAR -- Normal.
);Anyone who has the link will be able to view this.