Serial Number: 24
Year: 2013
Kind of Traffic: Simulated
Publicly Available: Yes
Count of Records: 5952 instances
Features Count:
No. of citations: 441
Attack Type: DoS, DDoS, Brute-force, and Infiltration
Download Links: https://research.unsw.edu.au/projects/adfa-ids-datasets
Abstract: Creech and Hu proposed ADFA2013 dataset in University of New south Wales in 2013 that employs payloads and vectors to attack the Ubuntu operating system. The payloads include “add new superuser”, “C100 Webshell”, “java based meterpreter”, “linux meterpreter payload”, and “password brute-force”. This data set includes “3” data types: attack data, training data, and validation data. “4373” traces are in training data set. There are 833 traces in the normal validation data. Each vector in the attack data has ten attacks. Disadvantage of the ADFA is lack of attack diversity and behaviour of attacks are not well separated from normal behaviour. However, ADFA2013 is publically available dataset.