Update README.md
Browse files
README.md
CHANGED
@@ -1,3 +1,78 @@
|
|
1 |
-
---
|
2 |
-
license:
|
3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
---
|
2 |
+
license: gpl-3.0
|
3 |
+
tags:
|
4 |
+
- Anomaly Detection
|
5 |
+
- Machine Learning
|
6 |
+
- Wireshark
|
7 |
+
- Network
|
8 |
+
|
9 |
+
---
|
10 |
+
|
11 |
+
# Network Traffic Dataset for Anomaly Detection
|
12 |
+
|
13 |
+
## Overview
|
14 |
+
|
15 |
+
This project presents a comprehensive network traffic dataset used for training AI models for anomaly detection in cybersecurity. The dataset was collected using Wireshark and includes both normal network traffic and various types of simulated network attacks. These attacks cover a wide range of common cybersecurity threats, providing an ideal resource for training systems to detect and respond to real-time network anomalies.
|
16 |
+
|
17 |
+
## Dataset Description
|
18 |
+
|
19 |
+
<img src="https://cdn-uploads.huggingface.co/production/uploads/678f9d410090fe62b768ee9e/JWZihHl-lxx0y0mZbKZQd.png" width="400" />
|
20 |
+
|
21 |
+
### Attack Types
|
22 |
+
|
23 |
+
To generate a diverse and comprehensive dataset, different types of attacks were simulated on test networks. The attack types are categorized as follows:
|
24 |
+
|
25 |
+
1. **Exploit (Open Target Attacks)**
|
26 |
+
- VulnBot
|
27 |
+
- CVE-2020
|
28 |
+
- SQL Injection
|
29 |
+
- Evil Twin Attack
|
30 |
+
|
31 |
+
2. **Probe (Network Reconnaissance Attacks)**
|
32 |
+
- MITM Attack
|
33 |
+
- Port Scan
|
34 |
+
|
35 |
+
3. **Flood**
|
36 |
+
- Slowloris
|
37 |
+
- UDP Flood
|
38 |
+
- HTTP Flood
|
39 |
+
- SYN Flood
|
40 |
+
- Amplification
|
41 |
+
- ICMP Flood
|
42 |
+
|
43 |
+
4. **Malware (Malicious Software Attacks)**
|
44 |
+
- Cerber
|
45 |
+
- GlobeImposter
|
46 |
+
- Agent Tesla
|
47 |
+
- FormBook
|
48 |
+
- Redline Stealer
|
49 |
+
- Chthonic Trojan
|
50 |
+
- Lokibot Trojan
|
51 |
+
- Ratinfected Trojan
|
52 |
+
- Squirrel Waffle Trojan
|
53 |
+
- Delf Banker Trojan
|
54 |
+
|
55 |
+
5. **Brute Force (Authorization System Attacks)**
|
56 |
+
- Password Cracking
|
57 |
+
- MySQL Brute Force
|
58 |
+
- Redis Brute Force
|
59 |
+
- SMB Brute Force
|
60 |
+
|
61 |
+
6. **Benign (Normal Network Traffic)**
|
62 |
+
- Temporal and Spatial Benign Traffic (No attacks)
|
63 |
+
|
64 |
+
## Dataset Features
|
65 |
+
|
66 |
+
- Detailed network traffic logs (including timestamps, IP addresses, and port numbers)
|
67 |
+
- Rich data for multiple attack scenarios (as described above)
|
68 |
+
- Simulated attack conditions mimicking real-world cybersecurity threats
|
69 |
+
- Wireshark captures for deep packet inspection
|
70 |
+
|
71 |
+
## Applications
|
72 |
+
|
73 |
+
This dataset is ideal for:
|
74 |
+
|
75 |
+
- Training AI and machine learning models for network security
|
76 |
+
- Testing and evaluating cybersecurity tools and systems
|
77 |
+
- Developing real-time intrusion detection and anomaly detection systems
|
78 |
+
- Enhancing threat analysis and response strategies in network environments
|