File size: 5,325 Bytes
3446499
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
f96d750
 
 
 
 
 
 
3446499
0006e17
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
043dfe8
0006e17
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
f96d750
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
---
dataset_info:
  features:
  - name: srcip
    dtype: string
  - name: sport
    dtype: string
  - name: dstip
    dtype: string
  - name: dsport
    dtype: string
  - name: proto
    dtype: string
  - name: state
    dtype: string
  - name: dur
    dtype: float64
  - name: sbytes
    dtype: int64
  - name: dbytes
    dtype: int64
  - name: sttl
    dtype: int64
  - name: dttl
    dtype: int64
  - name: sloss
    dtype: int64
  - name: dloss
    dtype: int64
  - name: service
    dtype: string
  - name: Sload
    dtype: float64
  - name: Dload
    dtype: float64
  - name: Spkts
    dtype: int64
  - name: Dpkts
    dtype: int64
  - name: swin
    dtype: int64
  - name: dwin
    dtype: int64
  - name: stcpb
    dtype: int64
  - name: dtcpb
    dtype: int64
  - name: smeansz
    dtype: int64
  - name: dmeansz
    dtype: int64
  - name: trans_depth
    dtype: int64
  - name: res_bdy_len
    dtype: int64
  - name: Sjit
    dtype: float64
  - name: Djit
    dtype: float64
  - name: Stime
    dtype: int64
  - name: Ltime
    dtype: int64
  - name: Sintpkt
    dtype: float64
  - name: Dintpkt
    dtype: float64
  - name: tcprtt
    dtype: float64
  - name: synack
    dtype: float64
  - name: ackdat
    dtype: float64
  - name: is_sm_ips_ports
    dtype: int64
  - name: ct_state_ttl
    dtype: int64
  - name: ct_flw_http_mthd
    dtype: float64
  - name: is_ftp_login
    dtype: float64
  - name: ct_ftp_cmd
    dtype: string
  - name: ct_srv_src
    dtype: int64
  - name: ct_srv_dst
    dtype: int64
  - name: ct_dst_ltm
    dtype: int64
  - name: ct_src_ltm
    dtype: int64
  - name: ct_src_dport_ltm
    dtype: int64
  - name: ct_dst_sport_ltm
    dtype: int64
  - name: ct_dst_src_ltm
    dtype: int64
  - name: attack_cat
    dtype: string
  - name: label
    dtype: int64
  splits:
  - name: train
    num_bytes: 907689217
    num_examples: 2280090
  download_size: 230016344
  dataset_size: 907689217
configs:
- config_name: default
  data_files:
  - split: train
    path: data/train-*
task_categories:
- text-classification
- zero-shot-classification
language:
- en
size_categories:
- 1M<n<10M
---
# The UNSW-NB15

The raw network packets (Pcap files) of the UNSW-NB 15 data set is created by the IXIA 
PerfectStorm tool in the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) 
for generating a hybrid of real modern normal activities and synthetic contemporary attack 
activities. The UNSW-NB15 source files are provided in different formats, Pcap files, BRO files, 
Argus Files and CSV files. The source files of the data set were divided based in the date of the 
simulation 22-1-2015 and 17-2-2015, respectively. The descriptions of these simulations are 
provided in the report files to show the network configurations and the actions of the attack types 
during the simulation

## How to Use it

 pip install datasets
 
 from datasets import load_dataset
 
 dataset = load_dataset("Mouwiya/UNSW-NB15")



### Dataset Description

The details of the UNSW-NB15 dataset were published in following the papers. For the academic/public use of this dataset, the authors have to cities the following papers:

Moustafa, Nour, and Jill Slay. "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)." Military Communications and Information Systems Conference (MilCIS), 2015. IEEE, 2015.
Moustafa, Nour, and Jill Slay. "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 dataset." Information Security Journal: A Global Perspective (2016): 1-14.
Moustafa, Nour, et al. "Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks." IEEE Transactions on Big Data (2017).
Moustafa, Nour, et al. "Big data analytics for intrusion detection system: statistical decision-making using finite dirichlet mixture models." Data Analytics and Decision Support for Cybersecurity. Springer, Cham, 2017. 127-156.
Sarhan, Mohanad, Siamak Layeghy, Nour Moustafa, and Marius Portmann. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings (p. 117). Springer Nature.


## Uses

<!-- Address questions around how the dataset is intended to be used. -->
Free use of the UNSW-NB15 dataset for academic research purposes is hereby granted in 
perpetuity. Use for commercial purposes is strictly prohibited. Nour Moustafa has asserted his
rights under the Copyright. 



## Citation

<!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 2015, pp. 1-6, doi: 10.1109/MilCIS.2015.7348942. keywords: {Telecommunication traffic;Feature extraction;Servers;Training;Data models;IP networks;Benchmark testing;UNSW-NB15 data set;NIDS;low footprint attacks;pcap files;testbed},