five

malicious network dataset

收藏
NIAID Data Ecosystem2026-05-02 收录
下载链接:
https://zenodo.org/record/14559921
下载链接
链接失效反馈
官方服务:
资源简介:
The dataset was collected using honeypots deployed with the Honeytrap agent. The honeypots captured both benign and malicious network traffic, providing valuable insights into different attack behaviors. The dataset consists of 9 features that represent various aspects of network traffic, including both structural and payload data. These features are as follows: Protocol: The communication protocol used in the network traffic, such as HTTP, FTP, or SSH. remote_ip: The IP address of the remote (attacker) system that initiated the connection. remote_port: The port number on the remote system that the connection was made to. local_ip: The IP address of the local (honeypot) system that received the connection. local_port: The port number on the local system that accepted the connection. md5_hash: The MD5 hash of the data payload (if applicable), used for identifying and comparing files or data. sha512_hash: The SHA-512 hash of the data payload (if applicable), providing a more secure representation for identifying files or data. Length: The length of the data payload (in bytes), representing the size of the network traffic. data_hex: The hexadecimal representation of the raw data payload, which can include commands or other information related to the communication. This dataset was used to train machine learning models to classify the network traffic as either benign or malicious. The features provide valuable information to differentiate between normal communication and suspicious activities, such as potential cyber-attacks.
创建时间:
2024-12-26
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作