AINovice2005 commited on
Commit
62a0fb7
·
verified ·
1 Parent(s): b7069b1

update dataset readme

Browse files
Files changed (1) hide show
  1. README.md +179 -1
README.md CHANGED
@@ -220,4 +220,182 @@ tags:
220
  - cybersecurity
221
  size_categories:
222
  - 1M<n<10M
223
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
220
  - cybersecurity
221
  size_categories:
222
  - 1M<n<10M
223
+ ---
224
+
225
+ # CICFlow Multiclass Intrusion Detection Dataset
226
+
227
+ ## Overview
228
+
229
+ This dataset provides a **multiclass network intrusion detection (IDS) benchmark** derived from **CICFlowMeter flow-level features**.
230
+ It is designed for **attack-type classification**, **robust IDS research**, and **interpretable security modeling**.
231
+
232
+ Each network flow is labeled as either **benign** or one of **nine attack categories**, following a standard IDS taxonomy.
233
+
234
+ The dataset is published in **Hugging Face `datasets` format** with explicit schemas, clean preprocessing, and reproducible splits.
235
+
236
+ ---
237
+
238
+ ## Task
239
+
240
+ **Multiclass classification**
241
+
242
+ > *Given a network flow represented by CICFlowMeter features, predict the attack category.*
243
+
244
+ ---
245
+
246
+ ## Label Taxonomy
247
+
248
+ The dataset uses the following **10-class label space**:
249
+
250
+ | Label ID | Name | Description |
251
+ | -------: | -------------- | ------------------------------------------ |
252
+ | 0 | benign | Normal network traffic |
253
+ | 1 | analysis | Port scans, probing, and analysis activity |
254
+ | 2 | backdoor | Backdoor and remote access behavior |
255
+ | 3 | dos | Denial-of-Service attacks |
256
+ | 4 | exploits | Exploitation of vulnerabilities |
257
+ | 5 | fuzzers | Fuzzing and malformed input attacks |
258
+ | 6 | generic | Generic attack traffic |
259
+ | 7 | reconnaissance | Reconnaissance and information gathering |
260
+ | 8 | shellcode | Shellcode execution attempts |
261
+ | 9 | worms | Worm propagation traffic |
262
+
263
+ ### Additional label fields
264
+
265
+ * `label` → multiclass label (0–9)
266
+ * `is_attack` → binary indicator (`1` if label ≠ 0, else `0`)
267
+
268
+ This allows both **multiclass IDS** and **binary detection** experiments without reprocessing.
269
+
270
+ ---
271
+
272
+ ## Dataset Structure
273
+
274
+ ```json
275
+ DatasetDict({
276
+ train,
277
+ validation,
278
+ test
279
+ })
280
+ ```
281
+
282
+ Each split contains records with the following schema:
283
+
284
+ ```json
285
+ flow_id: string
286
+ features: dict[str, float]
287
+ semantic_flags: dict[str, int]
288
+ label: ClassLabel (0–9)
289
+ is_attack: int (0/1)
290
+ ```
291
+
292
+ ---
293
+
294
+ ## Feature Description
295
+
296
+ ### 1. Raw Numeric Features (`features`)
297
+
298
+ The `features` field contains **CICFlowMeter-derived flow statistics**, including:
299
+
300
+ #### Traffic volume & direction
301
+
302
+ * `total_fwd_packets`, `total_bwd_packets`
303
+ * `total_length_of_fwd_packets`
304
+ * `total_length_of_bwd_packets`
305
+ * `down_up_ratio`
306
+
307
+ #### Packet size statistics
308
+
309
+ * `packet_length_min`, `packet_length_max`
310
+ * `packet_length_mean`, `packet_length_std`, `packet_length_variance`
311
+ * Forward and backward packet length statistics
312
+
313
+ #### Timing & inter-arrival times
314
+
315
+ * `flow_duration`
316
+ * `flow_iat_mean`, `flow_iat_std`, `flow_iat_max`, `flow_iat_min`
317
+ * Forward and backward IAT statistics
318
+ * `active_*`, `idle_*` metrics
319
+
320
+ #### Rate-based features
321
+
322
+ * `flow_bytes_per_s`
323
+ * `flow_packets_per_s`
324
+ * `fwd_packets_per_s`, `bwd_packets_per_s`
325
+
326
+ #### TCP flag counters
327
+
328
+ * `syn_flag_count`, `ack_flag_count`, `rst_flag_count`
329
+ * `fin_flag_count`, `psh_flag_count`, `urg_flag_count`
330
+ * `cwr_flag_count`, `ece_flag_count`
331
+
332
+ #### Bulk and subflow statistics
333
+
334
+ * `*_bulk_*` features (conditionally emitted by CICFlowMeter)
335
+ * `subflow_fwd_*`, `subflow_bwd_*`
336
+
337
+ > **Note:** Some CICFlowMeter features are conditionally emitted.
338
+ > Missing or undefined numeric values were **filled with `0.0`**, which semantically indicates *absence of that behavior*.
339
+
340
+ ---
341
+
342
+ ### 2. Semantic Flags (`semantic_flags`)
343
+
344
+ To support **interpretable and rule-based IDS**, each flow includes deterministic semantic indicators:
345
+
346
+ | Flag | Meaning |
347
+ | --------------------- | ---------------------------------------- |
348
+ | `high_packet_rate` | Very high packets per second |
349
+ | `one_way_traffic` | Forward-only traffic (no response) |
350
+ | `syn_ack_imbalance` | Large SYN/ACK imbalance |
351
+ | `uniform_packet_size` | Low packet size variance |
352
+ | `long_idle_c2` | Long idle periods (possible C2 behavior) |
353
+
354
+ These flags are:
355
+
356
+ * Derived deterministically from numeric features
357
+ * Stable across dataset versions
358
+ * Suitable for rule-based or hybrid ML systems
359
+
360
+ ---
361
+
362
+ ## Preprocessing Summary
363
+
364
+ The dataset was produced using a **fully deterministic pipeline**:
365
+
366
+ * Column name normalization
367
+ * Conversion of `NaN` / `±Infinity` → `0.0`
368
+ * Explicit label normalization (string → numeric)
369
+ * No row drops based on missing numeric values
370
+ * Stratified train/validation/test splits
371
+ * Explicit Hugging Face feature schemas
372
+
373
+ No synthetic balancing, oversampling, or augmentation was applied.
374
+
375
+ ---
376
+
377
+ ## Class Distribution & Imbalance
378
+
379
+ The dataset is **highly imbalanced**, reflecting real-world network traffic:
380
+
381
+ * Benign traffic dominates
382
+ * Some attack classes are rare
383
+
384
+ This is **intentional and realistic**.
385
+
386
+ Users are strongly encouraged to:
387
+
388
+ * Use **macro / weighted F1**
389
+ * Inspect **per-class recall**
390
+ * Apply **class weighting** where appropriate
391
+
392
+ Accuracy alone is not a meaningful metric for this dataset.
393
+
394
+ ---
395
+
396
+ ## Related Datasets
397
+
398
+ * A **binary IDS version** of this dataset is published separately for attack detection use cases.
399
+ * Both datasets share identical features and preprocessing logic.
400
+
401
+ ---