Dataset Details: ADFA

Dataset Information

Serial Number: 24

Year: 2013

Kind of Traffic: Simulated

Publicly Available: Yes

Count of Records: 5952 instances

Features Count:

CITE

No. of citations: 441

Attack Type: DoS, DDoS, Brute-force, and Infiltration

Download Links: https://research.unsw.edu.au/projects/adfa-ids-datasets

Abstract: Creech and Hu proposed ADFA2013 dataset in University of New south Wales in 2013 that employs payloads and vectors to attack the Ubuntu operating system. The payloads include “add new superuser”, “C100 Webshell”, “java based meterpreter”, “linux meterpreter payload”, and “password brute-force”. This data set includes “3” data types: attack data, training data, and validation data. “4373” traces are in training data set. There are 833 traces in the normal validation data. Each vector in the attack data has ten attacks. Disadvantage of the ADFA is lack of attack diversity and behaviour of attacks are not well separated from normal behaviour. However, ADFA2013 is publically available dataset.

Back to Datasets