onurkya7 commited on
Commit
0ad73e0
·
verified ·
1 Parent(s): 82a12ae

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +78 -3
README.md CHANGED
@@ -1,3 +1,78 @@
1
- ---
2
- license: lgpl-3.0
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: gpl-3.0
3
+ tags:
4
+ - Anomaly Detection
5
+ - Machine Learning
6
+ - Wireshark
7
+ - Network
8
+
9
+ ---
10
+
11
+ # Network Traffic Dataset for Anomaly Detection
12
+
13
+ ## Overview
14
+
15
+ This project presents a comprehensive network traffic dataset used for training AI models for anomaly detection in cybersecurity. The dataset was collected using Wireshark and includes both normal network traffic and various types of simulated network attacks. These attacks cover a wide range of common cybersecurity threats, providing an ideal resource for training systems to detect and respond to real-time network anomalies.
16
+
17
+ ## Dataset Description
18
+
19
+ <img src="https://cdn-uploads.huggingface.co/production/uploads/678f9d410090fe62b768ee9e/JWZihHl-lxx0y0mZbKZQd.png" width="400" />
20
+
21
+ ### Attack Types
22
+
23
+ To generate a diverse and comprehensive dataset, different types of attacks were simulated on test networks. The attack types are categorized as follows:
24
+
25
+ 1. **Exploit (Open Target Attacks)**
26
+ - VulnBot
27
+ - CVE-2020
28
+ - SQL Injection
29
+ - Evil Twin Attack
30
+
31
+ 2. **Probe (Network Reconnaissance Attacks)**
32
+ - MITM Attack
33
+ - Port Scan
34
+
35
+ 3. **Flood**
36
+ - Slowloris
37
+ - UDP Flood
38
+ - HTTP Flood
39
+ - SYN Flood
40
+ - Amplification
41
+ - ICMP Flood
42
+
43
+ 4. **Malware (Malicious Software Attacks)**
44
+ - Cerber
45
+ - GlobeImposter
46
+ - Agent Tesla
47
+ - FormBook
48
+ - Redline Stealer
49
+ - Chthonic Trojan
50
+ - Lokibot Trojan
51
+ - Ratinfected Trojan
52
+ - Squirrel Waffle Trojan
53
+ - Delf Banker Trojan
54
+
55
+ 5. **Brute Force (Authorization System Attacks)**
56
+ - Password Cracking
57
+ - MySQL Brute Force
58
+ - Redis Brute Force
59
+ - SMB Brute Force
60
+
61
+ 6. **Benign (Normal Network Traffic)**
62
+ - Temporal and Spatial Benign Traffic (No attacks)
63
+
64
+ ## Dataset Features
65
+
66
+ - Detailed network traffic logs (including timestamps, IP addresses, and port numbers)
67
+ - Rich data for multiple attack scenarios (as described above)
68
+ - Simulated attack conditions mimicking real-world cybersecurity threats
69
+ - Wireshark captures for deep packet inspection
70
+
71
+ ## Applications
72
+
73
+ This dataset is ideal for:
74
+
75
+ - Training AI and machine learning models for network security
76
+ - Testing and evaluating cybersecurity tools and systems
77
+ - Developing real-time intrusion detection and anomaly detection systems
78
+ - Enhancing threat analysis and response strategies in network environments