Data

The UNSW-NB15 dataset

University of New South Wales
Moustafa, Nour
Viewed: [[ro.stat.viewed]] Cited: [[ro.stat.cited]] Accessed: [[ro.stat.accessed]]
ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rfr_id=info%3Asid%2FANDS&rft_id=info:doi10.26190/5d7ac5b1e8485&rft.title=The UNSW-NB15 dataset&rft.identifier=https://doi.org/10.26190/5d7ac5b1e8485&rft.publisher=UNSW, Sydney&rft.description=The raw network packets of the UNSW-NB 15 dataset was created by the IXIA PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. Tcpdump tool is utilised to capture 100 GB of the raw traffic (e.g., Pcap files). This data set has nine types of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. The Argus, Bro-IDS tools are used and twelve algorithms are developed to generate totally 49 features with the class label.&rft.creator=Moustafa, Nour &rft.date=2019&rft.relation=http://hdl.handle.net/1959.4/100189&rft.relation=http://ro.ecu.edu.au/isw/59/&rft.relation=10.1080/19393555.2015.1125974&rft.relation=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7348942&rft_rights= https://www.gnu.org/licenses/gpl-3.0.html&rft_subject=UNSW-NB15 dataset&rft_subject=Computer System Security&rft_subject=INFORMATION AND COMPUTING SCIENCES&rft_subject=COMPUTER SOFTWARE&rft_subject=Defence and Security Policy&rft_subject=LAW, POLITICS AND COMMUNITY SERVICES&rft_subject=INTERNATIONAL RELATIONS&rft.type=dataset&rft.language=English Access the data

Licence & Rights:

Open Licence view details

Access:

Open view details

Full description

The raw network packets of the UNSW-NB 15 dataset was created by the IXIA PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. Tcpdump tool is utilised to capture 100 GB of the raw traffic (e.g., Pcap files). This data set has nine types of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. The Argus, Bro-IDS tools are used and twelve algorithms are developed to generate totally 49 features with the class label.

Issued: 2019

Data time period: 2015-09-30

This dataset is part of a larger collection

Click to explore relationships graph