Serial Number: 20
Year: 2012
Kind of Traffic: Simulated
Publicly Available: Yes
Count of Records: 2M
Features Count: 19
No. of citations: 1508
Attack Type: DoS, DDoS, brute force, infiltration
Download Links: https://www.impactcybertrust.org/dataset_view?idDataset=916
Abstract: Shiravi et al. generated the ISCX dataset in 2012, which includes activity of network for "7" days (malicious & normal) and is available to public. Malicious activity contains I. Brute Force SSH, II. Distributed Denial of Service, III. HTTP Denial of Service, & IV. internal network infiltration. Dynamic approach is used to generate this dataset. The author’s strategy is divided into two parts: beta and alpha profiles. Beta profiles describe normal behaviour of the user such as writing emails or surfing the web whereas alpha profiles describe attack scenarios. New dataset is generated using these profiles in bidirectional flow-based format & packet-based format. The various types of attacks are DDOS, DOS, or SSH brute force. A real trace is analysed in order to generate profiles for IMAP, HTTP, SMTP, SSH, FTP & POP3 protocols. As HTTPS accounts for about 70% of today's network traffic & this dataset does not include HTTPS traces. Furthermore, the simulated attack distribution is not based on statistics of real-world.