IEEE/ICACT20220314 Slide.07        [Big Slide]       [YouTube] Oral Presentation
In UNSW-NB15, it has both normal and malicious traffic in its dataset. The nine malicious classes are included backdoors, DDoS, fuzzer, and worms. In the CIC-IDS-2017 and the 2018, they have normal and malicious user behavior. SSH brute force, Heartbleed, Botnet, DoS, Web, and Infiltration Attacks. They also introduced the CIC Flowmeter which can extract 80 statistical features.

[Go to Next Slide]
Select Voice: