Planned intervention: On Thursday 19/09 between 05:30-06:30 (UTC), Zenodo will be unavailable because of a scheduled upgrade in our storage cluster.
Published September 14, 2021 | Version v3
Dataset Open

Anomaly Detection and Machine Learning

Description

The datasets were preprocessed. Correlated features were removed.

Related papers:

[1] Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018

[2] Nour Moustafa, October 16, 2019, "UNSW_NB15 dataset", IEEE Dataport, doi: https://dx.doi.org/10.21227/8vf7-s525.

[3] “Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. http://doi.org/10.5281/zenodo.4743746”

[4]  A. D. Kent, “Comprehensive, Multi-Source Cybersecurity Events,” Los Alamos National Laboratory, http://dx.doi.org/10.17021/1179829, 2015.

 

Files

cic-ids-2017.csv

Files (729.6 MB)

Name Size Download all
md5:9c2d414c28a341bc8a5fbd304787ba62
542.2 MB Preview Download
md5:ce21be333000a0751d8478d7c0f812d2
2.3 MB Preview Download
md5:2ef25349346bdcfc1ac9426ce09b695e
4.6 MB Preview Download
md5:532d91e37d19acd1f9e1f7802231b71b
94.6 MB Preview Download
md5:08fc6f99cce98d6b9bd968a720b87902
44.1 MB Preview Download
md5:4ca0121dbb7df72f50e7e275198bbb21
41.8 MB Preview Download