Datasets:
Tasks:
Tabular Classification
Modalities:
Text
Languages:
English
Size:
1M - 10M
Tags:
cybersecurity
update dataset readme
Browse files
README.md
CHANGED
|
@@ -220,4 +220,182 @@ tags:
|
|
| 220 |
- cybersecurity
|
| 221 |
size_categories:
|
| 222 |
- 1M<n<10M
|
| 223 |
-
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 220 |
- cybersecurity
|
| 221 |
size_categories:
|
| 222 |
- 1M<n<10M
|
| 223 |
+
---
|
| 224 |
+
|
| 225 |
+
# CICFlow Multiclass Intrusion Detection Dataset
|
| 226 |
+
|
| 227 |
+
## Overview
|
| 228 |
+
|
| 229 |
+
This dataset provides a **multiclass network intrusion detection (IDS) benchmark** derived from **CICFlowMeter flow-level features**.
|
| 230 |
+
It is designed for **attack-type classification**, **robust IDS research**, and **interpretable security modeling**.
|
| 231 |
+
|
| 232 |
+
Each network flow is labeled as either **benign** or one of **nine attack categories**, following a standard IDS taxonomy.
|
| 233 |
+
|
| 234 |
+
The dataset is published in **Hugging Face `datasets` format** with explicit schemas, clean preprocessing, and reproducible splits.
|
| 235 |
+
|
| 236 |
+
---
|
| 237 |
+
|
| 238 |
+
## Task
|
| 239 |
+
|
| 240 |
+
**Multiclass classification**
|
| 241 |
+
|
| 242 |
+
> *Given a network flow represented by CICFlowMeter features, predict the attack category.*
|
| 243 |
+
|
| 244 |
+
---
|
| 245 |
+
|
| 246 |
+
## Label Taxonomy
|
| 247 |
+
|
| 248 |
+
The dataset uses the following **10-class label space**:
|
| 249 |
+
|
| 250 |
+
| Label ID | Name | Description |
|
| 251 |
+
| -------: | -------------- | ------------------------------------------ |
|
| 252 |
+
| 0 | benign | Normal network traffic |
|
| 253 |
+
| 1 | analysis | Port scans, probing, and analysis activity |
|
| 254 |
+
| 2 | backdoor | Backdoor and remote access behavior |
|
| 255 |
+
| 3 | dos | Denial-of-Service attacks |
|
| 256 |
+
| 4 | exploits | Exploitation of vulnerabilities |
|
| 257 |
+
| 5 | fuzzers | Fuzzing and malformed input attacks |
|
| 258 |
+
| 6 | generic | Generic attack traffic |
|
| 259 |
+
| 7 | reconnaissance | Reconnaissance and information gathering |
|
| 260 |
+
| 8 | shellcode | Shellcode execution attempts |
|
| 261 |
+
| 9 | worms | Worm propagation traffic |
|
| 262 |
+
|
| 263 |
+
### Additional label fields
|
| 264 |
+
|
| 265 |
+
* `label` → multiclass label (0–9)
|
| 266 |
+
* `is_attack` → binary indicator (`1` if label ≠ 0, else `0`)
|
| 267 |
+
|
| 268 |
+
This allows both **multiclass IDS** and **binary detection** experiments without reprocessing.
|
| 269 |
+
|
| 270 |
+
---
|
| 271 |
+
|
| 272 |
+
## Dataset Structure
|
| 273 |
+
|
| 274 |
+
```json
|
| 275 |
+
DatasetDict({
|
| 276 |
+
train,
|
| 277 |
+
validation,
|
| 278 |
+
test
|
| 279 |
+
})
|
| 280 |
+
```
|
| 281 |
+
|
| 282 |
+
Each split contains records with the following schema:
|
| 283 |
+
|
| 284 |
+
```json
|
| 285 |
+
flow_id: string
|
| 286 |
+
features: dict[str, float]
|
| 287 |
+
semantic_flags: dict[str, int]
|
| 288 |
+
label: ClassLabel (0–9)
|
| 289 |
+
is_attack: int (0/1)
|
| 290 |
+
```
|
| 291 |
+
|
| 292 |
+
---
|
| 293 |
+
|
| 294 |
+
## Feature Description
|
| 295 |
+
|
| 296 |
+
### 1. Raw Numeric Features (`features`)
|
| 297 |
+
|
| 298 |
+
The `features` field contains **CICFlowMeter-derived flow statistics**, including:
|
| 299 |
+
|
| 300 |
+
#### Traffic volume & direction
|
| 301 |
+
|
| 302 |
+
* `total_fwd_packets`, `total_bwd_packets`
|
| 303 |
+
* `total_length_of_fwd_packets`
|
| 304 |
+
* `total_length_of_bwd_packets`
|
| 305 |
+
* `down_up_ratio`
|
| 306 |
+
|
| 307 |
+
#### Packet size statistics
|
| 308 |
+
|
| 309 |
+
* `packet_length_min`, `packet_length_max`
|
| 310 |
+
* `packet_length_mean`, `packet_length_std`, `packet_length_variance`
|
| 311 |
+
* Forward and backward packet length statistics
|
| 312 |
+
|
| 313 |
+
#### Timing & inter-arrival times
|
| 314 |
+
|
| 315 |
+
* `flow_duration`
|
| 316 |
+
* `flow_iat_mean`, `flow_iat_std`, `flow_iat_max`, `flow_iat_min`
|
| 317 |
+
* Forward and backward IAT statistics
|
| 318 |
+
* `active_*`, `idle_*` metrics
|
| 319 |
+
|
| 320 |
+
#### Rate-based features
|
| 321 |
+
|
| 322 |
+
* `flow_bytes_per_s`
|
| 323 |
+
* `flow_packets_per_s`
|
| 324 |
+
* `fwd_packets_per_s`, `bwd_packets_per_s`
|
| 325 |
+
|
| 326 |
+
#### TCP flag counters
|
| 327 |
+
|
| 328 |
+
* `syn_flag_count`, `ack_flag_count`, `rst_flag_count`
|
| 329 |
+
* `fin_flag_count`, `psh_flag_count`, `urg_flag_count`
|
| 330 |
+
* `cwr_flag_count`, `ece_flag_count`
|
| 331 |
+
|
| 332 |
+
#### Bulk and subflow statistics
|
| 333 |
+
|
| 334 |
+
* `*_bulk_*` features (conditionally emitted by CICFlowMeter)
|
| 335 |
+
* `subflow_fwd_*`, `subflow_bwd_*`
|
| 336 |
+
|
| 337 |
+
> **Note:** Some CICFlowMeter features are conditionally emitted.
|
| 338 |
+
> Missing or undefined numeric values were **filled with `0.0`**, which semantically indicates *absence of that behavior*.
|
| 339 |
+
|
| 340 |
+
---
|
| 341 |
+
|
| 342 |
+
### 2. Semantic Flags (`semantic_flags`)
|
| 343 |
+
|
| 344 |
+
To support **interpretable and rule-based IDS**, each flow includes deterministic semantic indicators:
|
| 345 |
+
|
| 346 |
+
| Flag | Meaning |
|
| 347 |
+
| --------------------- | ---------------------------------------- |
|
| 348 |
+
| `high_packet_rate` | Very high packets per second |
|
| 349 |
+
| `one_way_traffic` | Forward-only traffic (no response) |
|
| 350 |
+
| `syn_ack_imbalance` | Large SYN/ACK imbalance |
|
| 351 |
+
| `uniform_packet_size` | Low packet size variance |
|
| 352 |
+
| `long_idle_c2` | Long idle periods (possible C2 behavior) |
|
| 353 |
+
|
| 354 |
+
These flags are:
|
| 355 |
+
|
| 356 |
+
* Derived deterministically from numeric features
|
| 357 |
+
* Stable across dataset versions
|
| 358 |
+
* Suitable for rule-based or hybrid ML systems
|
| 359 |
+
|
| 360 |
+
---
|
| 361 |
+
|
| 362 |
+
## Preprocessing Summary
|
| 363 |
+
|
| 364 |
+
The dataset was produced using a **fully deterministic pipeline**:
|
| 365 |
+
|
| 366 |
+
* Column name normalization
|
| 367 |
+
* Conversion of `NaN` / `±Infinity` → `0.0`
|
| 368 |
+
* Explicit label normalization (string → numeric)
|
| 369 |
+
* No row drops based on missing numeric values
|
| 370 |
+
* Stratified train/validation/test splits
|
| 371 |
+
* Explicit Hugging Face feature schemas
|
| 372 |
+
|
| 373 |
+
No synthetic balancing, oversampling, or augmentation was applied.
|
| 374 |
+
|
| 375 |
+
---
|
| 376 |
+
|
| 377 |
+
## Class Distribution & Imbalance
|
| 378 |
+
|
| 379 |
+
The dataset is **highly imbalanced**, reflecting real-world network traffic:
|
| 380 |
+
|
| 381 |
+
* Benign traffic dominates
|
| 382 |
+
* Some attack classes are rare
|
| 383 |
+
|
| 384 |
+
This is **intentional and realistic**.
|
| 385 |
+
|
| 386 |
+
Users are strongly encouraged to:
|
| 387 |
+
|
| 388 |
+
* Use **macro / weighted F1**
|
| 389 |
+
* Inspect **per-class recall**
|
| 390 |
+
* Apply **class weighting** where appropriate
|
| 391 |
+
|
| 392 |
+
Accuracy alone is not a meaningful metric for this dataset.
|
| 393 |
+
|
| 394 |
+
---
|
| 395 |
+
|
| 396 |
+
## Related Datasets
|
| 397 |
+
|
| 398 |
+
* A **binary IDS version** of this dataset is published separately for attack detection use cases.
|
| 399 |
+
* Both datasets share identical features and preprocessing logic.
|
| 400 |
+
|
| 401 |
+
---
|