Data

The UNSW-NB15 dataset

University of New South Wales
Moustafa, Nour
Viewed: [[ro.stat.viewed]] Cited: [[ro.stat.cited]] Accessed: [[ro.stat.accessed]]
ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rfr_id=info%3Asid%2FANDS&rft_id=info:doi10.26190/5d7ac5b1e8485&rft.title=The UNSW-NB15 dataset&rft.identifier=https://doi.org/10.26190/5d7ac5b1e8485&rft.publisher=UNSW&rft.description=The raw network packets of the UNSW-NB 15 dataset was created by the IXIA PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. Tcpdump tool is utilised to capture 100 GB of the raw traffic (e.g., Pcap files). This data set has nine types of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. The Argus, Bro-IDS tools are used and twelve algorithms are developed to generate totally 49 features with the class label. Design a decent dataset for evaluating network anomaly detection system. (URL) https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/UNSW, 2015: Free use of the UNSW-NB15 dataset for academic research purposes is hereby granted in perpetuity. Use for commercial purposes is strictly prohibited. Nour Moustafa and Jill Slay have asserted their rights under Copyright&rft.creator=Moustafa, Nour &rft.date=2015&rft_rights=University of New South Wales 2019&rft_rights=General Public Licence&rft_subject=UNSW-NB15 dataset&rft_subject=Computer System Security&rft_subject=INFORMATION AND COMPUTING SCIENCES&rft_subject=COMPUTER SOFTWARE&rft_subject=Defence and Security Policy&rft_subject=LAW, POLITICS AND COMMUNITY SERVICES&rft_subject=INTERNATIONAL RELATIONS&rft.type=dataset&rft.language=English Access the data

Licence & Rights:

Open Licence view details
Gpl

General Public Licence

University of New South Wales 2019

Access:

Other view details

Public Access

Brief description

UNSW, 2015: Free use of the UNSW-NB15 dataset for academic research purposes is hereby granted in perpetuity. Use for commercial purposes is strictly prohibited. Nour Moustafa and Jill Slay have asserted their rights under Copyright

Full description

The raw network packets of the UNSW-NB 15 dataset was created by the IXIA PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) for generating a hybrid of real modern normal activities and synthetic contemporary attack behaviours. Tcpdump tool is utilised to capture 100 GB of the raw traffic (e.g., Pcap files). This data set has nine types of attacks, namely, Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic, Reconnaissance, Shellcode and Worms. The Argus, Bro-IDS tools are used and twelve algorithms are developed to generate totally 49 features with the class label. Design a decent dataset for evaluating network anomaly detection system.

(URL) https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/

Available: 30 09 2015

Click to explore relationships graph
Other Information
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set

doi : http://www.tandfonline.com/doi/abs/10.1080/19393555.2015.1125974

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)

local : http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7348942

Identifiers