| | --- |
| | license: apache-2.0 |
| | datasets: |
| | - rdpahalavan/network-packet-flow-header-payload |
| | widget: |
| | - text: >- |
| | 14 89 125161 -1 80 46060 1500 1460 253 0 5 0 -1 29 39 25 28 17 20 40 45 39 |
| | 56 50 41 59 42 42 58 47 37 55 40 30 51 51 37 55 47 40 57 45 32 62 32 30 50 |
| | 31 26 50 71 68 103 86 93 132 43 52 89 42 34 48 40 34 45 42 32 51 42 31 40 64 |
| | 38 32 182 151 122 72 65 74 66 48 63 50 40 59 52 42 61 61 46 60 68 42 60 63 |
| | 49 63 56 53 63 71 78 92 60 54 66 60 59 68 60 52 63 62 60 65 58 65 75 45 39 |
| | 66 38 31 44 40 31 45 41 28 47 43 32 54 45 33 55 42 28 48 39 32 40 31 31 44 |
| | 39 31 55 54 45 63 60 51 55 57 47 62 125 112 96 154 139 111 113 104 89 133 |
| | 126 100 161 144 123 157 135 117 87 68 69 103 81 71 183 163 128 177 159 128 |
| | 113 108 94 59 41 58 81 59 66 95 73 65 149 142 115 152 135 115 159 139 116 |
| | 168 157 127 101 84 81 56 35 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 |
| | -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 |
| | tags: |
| | - Network Intrusion Detection |
| | - Cybersecurity |
| | - Network Packets |
| | --- |
| | |
| | This model was fine-tuned for classifying a network packet into one of the below categories. For details about the dataset used, [visit here](https://huggingface.co/datasets/rdpahalavan/network-packet-flow-header-payload). |
| |
|
| | ```python |
| | ['Analysis', |
| | 'Backdoor', |
| | 'Bot', |
| | 'DDoS', |
| | 'DoS', |
| | 'DoS GoldenEye', |
| | 'DoS Hulk', |
| | 'DoS SlowHTTPTest', |
| | 'DoS Slowloris', |
| | 'Exploits', |
| | 'FTP Patator', |
| | 'Fuzzers', |
| | 'Generic', |
| | 'Heartbleed', |
| | 'Infiltration', |
| | 'Normal', |
| | 'Port Scan', |
| | 'Reconnaissance', |
| | 'SSH Patator', |
| | 'Shellcode', |
| | 'Web Attack - Brute Force', |
| | 'Web Attack - SQL Injection', |
| | 'Web Attack - XSS', |
| | 'Worms'] |
| | ``` |
| |
|