Dataset Details: VHS

Dataset Information

Serial Number: 96

Year: 2021

Kind of Traffic: Simulated + Real

Publicly Available: Yes

Count of Records: 27.7M flows

Features Count: 45

CITE

No. of citations: 10

Attack Type: DoS, botnet, etc

Download Links: https://www.kaggle.com/datasets/h2020simargl/vhs-22-network-traffic-dataset

Abstract: The VHS-22 data set contains over “27” million flows, approximately 20 million out of which are regular traffic and approximately 7 million are network attacks. Flows with only one packet were identified in both of these groups and were referred as zero-duration flows. They are responsible for total traffic of “45%” and total attacks of “83% (mainly DoS-related). It was discovered that UDP protocol was used in “62%” of flows, whereas others use TCP. In Zero-duration flows there are ”66%” of UDP protocol flows & 38% of TCP protocol flows. Flows longer than 160 seconds are also included in the dataset. The length of majority of flows are less than “200k” packets, but the length of longest flow is nearly “11.7M” packets. According to the distribution of attacks, “5.8%” Botnet & “93.9%” DoS related attacks cause the greatest no. of network flows labelled as attacks. Whereas remaining attack related traffic are “0.15%” Malware, “0.05%” web attacks & “0.8% brute force attacks.

Back to Datasets