Baselight

Comprehensive Malware Datasets

Anomaly incoming traffic

@kaggle.paytonjabir_comprehensive_malware_datasets

Loading...
Loading...

About this Dataset

Comprehensive Malware Datasets

This dataset containing a wide range of invasions simulated in a research organization was submitted to be audited. By imitating a typical Ecommerce function on the internet, it developed an environment for obtaining raw TCP/IP dump data for a network. The internet was concentrated as if it were a real setting, and various attacks were launched. A connection is a series of TCP packets that begin and stop at a specific time interval and allow data to flow from a source IP address to a target IP address using a well-defined protocol. In addition, each link is classified as either normal or an attack. Each connection record is around 100 bytes long.

For each TCP/IP connection, 19 quantitative and qualitative features are obtained from normal and attack data (2 qualitative and 17 quantitative features). The class variable has categories:
• Normal
• Buffer overflow
• IPsweep
• rootkit
• SQL attack
• worm

Tables

Malware Analysis

@kaggle.paytonjabir_comprehensive_malware_datasets.malware_analysis
  • 646.81 KB
  • 60937 rows
  • 19 columns
Loading...

CREATE TABLE malware_analysis (
  "n_0" BIGINT,
  "udp" VARCHAR,
  "private" VARCHAR,
  "sf" VARCHAR,
  "n_105" BIGINT,
  "n_146" BIGINT,
  "n_1" BIGINT,
  "n_1_1" BIGINT,
  "n_1_2" DOUBLE,
  "n_0_1" DOUBLE,
  "n_0_2" DOUBLE,
  "n_255" BIGINT,
  "n_254" BIGINT,
  "n_1_3" DOUBLE,
  "n_0_01" DOUBLE,
  "n_0_3" DOUBLE,
  "n_0_4" DOUBLE,
  "n_0_5" DOUBLE,
  "normal" VARCHAR
);

Share link

Anyone who has the link will be able to view this.