IEEE/ICACT20230167 Slide.12        [Big Slide]       Oral Presentation
Next, we need to discuss the data sets used for model training. We used three data sets. CIC-IDS and CIC-DDOS are two public data sets, which contain multiple abnormal data and normal data. The brute force attack data set is We use the Kali Linux environment with brute force attack tools to collect.

[Go to Next Slide]
Select Voice: