intrusion: Intrusion

Description Usage Format Source Examples

Description

A dataset consisting of a hundred communication packages along with some of their features sampled from a set of artificially created data publicly available on webpage of MIT Lincoln Laboratory: http://www. ll.mit.edu/mission/communications/ist/corpora/ideval/data/intex.html.

Usage

1

Format

A data frame with 100 rows and 7 columns:

Pr

The protocol-type, which is either tcp or icmp or udp.

BySD

The number of data bytes from source to destination.

SH

The number of connections to the same host as the current one in the past 2 s.

SS

The number of connections to the same service as the current one in the past 2 s.

SE

The rate of connections (per cent in SHCo) that have SYN errors.

RE

The rate of connections (per cent in SHCo) that have REJ errors.

A

The type of attack (ap - apache, sa - saint, sm - smurf, and no attack)

Source

Mirkin (2011). Core Concepts in Data Analysis: Summarization, Correlation and Visualization. http://www.springer.com/computer/theoretical+computer+science/book/978-0-85729-286-5

Examples

1

gschofl/coursedata documentation built on May 17, 2019, 8:52 a.m.