Virual Oral Presentation Slide by Slide |
![]() | ![]() |
|
![]() |
Next, we need to discuss the data sets used for model training. We used three data sets. CIC-IDS and CIC-DDOS are two public data sets, which contain multiple abnormal data and normal data. The brute force attack data set is We use the Kali Linux environment with brute force attack tools to collect. |
[Go to Next Slide] |