input
stringlengths
492
558
output
stringclasses
2 values
instruction
stringclasses
1 value
A network connection in which the time difference with the previous packet was 83128520.14732161, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83344056.48923479, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150162.17761502, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313711.97861558, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124768.61248542, minimum packet length in the flow was 42.0, maximum packet length in the flow was 51.18, magnitue was 9.214426625580936, sum of packet lengths in the flow was 450.18, average packet length in the flow was 42.48405263157894, packet's length was 45.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 3.48, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83037121.15975757, minimum packet length in the flow was 54.0, maximum packet length in the flow was 59.67, magnitue was 10.440239868816144, sum of packet lengths in the flow was 575.67, average packet length in the flow was 54.51134944591871, packet's length was 55.31, number of packets with RST flag set in the same flow was 0.03, number of packets with URG flag set in the same flow was 0.03 and the header length was 56.66, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83330989.82004589, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124139.52460529, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83072007.29445443, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124712.65780066, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83037122.63484418, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83365554.17599905, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 79.92, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83248787.8231067, minimum packet length in the flow was 250.38, maximum packet length in the flow was 1398.8, magnitue was 39.01718227933182, sum of packet lengths in the flow was 8477.01, average packet length in the flow was 784.1923928262571, packet's length was 827.94, number of packets with RST flag set in the same flow was 0.05, number of packets with URG flag set in the same flow was 0.0 and the header length was 17.41, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128614.61185515, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150338.8092888, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098703.03533168, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 26432.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83483278.18471359, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83097820.8672216, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 30389.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83012225.32188359, minimum packet length in the flow was 50.0, maximum packet length in the flow was 58.86, magnitue was 10.099780477420872, sum of packet lengths in the flow was 533.86, average packet length in the flow was 51.10209586285748, packet's length was 51.66, number of packets with RST flag set in the same flow was 0.17, number of packets with URG flag set in the same flow was 0.12 and the header length was 4673.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83015832.71533547, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 4549.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150564.21868955, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83064054.40638404, minimum packet length in the flow was 157.98, maximum packet length in the flow was 174.0, magnitue was 18.531168060880788, sum of packet lengths in the flow was 1797.3, average packet length in the flow was 171.76337961599802, packet's length was 171.62, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 172.52, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83037259.38403307, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83365550.49407503, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 104.76, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098357.60494417, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.1, magnitue was 10.00768591269702, sum of packet lengths in the flow was 526.1, average packet length in the flow was 50.076877140317535, packet's length was 50.1, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 23669.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83365497.68702616, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82951540.21717778, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362196.31690654, minimum packet length in the flow was 54.0, maximum packet length in the flow was 61.89, magnitue was 10.456742911331236, sum of packet lengths in the flow was 574.89, average packet length in the flow was 54.68336786497815, packet's length was 54.57, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 187.89, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128740.68426561, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83132199.26965252, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83586072.6282504, minimum packet length in the flow was 578.0, maximum packet length in the flow was 578.0, magnitue was 34.0, sum of packet lengths in the flow was 6069.0, average packet length in the flow was 578.0, packet's length was 578.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83789002.96151094, minimum packet length in the flow was 415.04, maximum packet length in the flow was 554.0, magnitue was 32.27509383970249, sum of packet lengths in the flow was 5415.16, average packet length in the flow was 523.0750318496005, packet's length was 520.83, number of packets with RST flag set in the same flow was 0.09, number of packets with URG flag set in the same flow was 0.06 and the header length was 2305676.68, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83348432.39452761, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83094031.89435239, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82976843.23040943, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.2, magnitue was 10.404328030054964, sum of packet lengths in the flow was 569.2, average packet length in the flow was 54.125137598899215, packet's length was 54.4, number of packets with RST flag set in the same flow was 0.06, number of packets with URG flag set in the same flow was 0.0 and the header length was 112.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313999.40060133, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 75.06, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83789298.31651647, minimum packet length in the flow was 433.0, maximum packet length in the flow was 500.76, magnitue was 29.64407845557792, sum of packet lengths in the flow was 4945.8, average packet length in the flow was 466.0870846951466, packet's length was 476.56, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 630064.2, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124885.50660206, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362124.30232626, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 72.36, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 0.0219443082809448, minimum packet length in the flow was 355.6, maximum packet length in the flow was 2962.0, magnitue was 43.91624636414544, sum of packet lengths in the flow was 4142.5, average packet length in the flow was 1047.6437698412697, packet's length was 506.3, number of packets with RST flag set in the same flow was 13.7, number of packets with URG flag set in the same flow was 3.3 and the header length was 9617.2, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83759296.20935078, minimum packet length in the flow was 385.16, maximum packet length in the flow was 544.0, magnitue was 31.708444959768944, sum of packet lengths in the flow was 5474.55, average packet length in the flow was 510.0033967519838, packet's length was 529.39, number of packets with RST flag set in the same flow was 0.63, number of packets with URG flag set in the same flow was 0.27 and the header length was 1007271.24, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83646661.43346842, minimum packet length in the flow was 419.42, maximum packet length in the flow was 572.92, magnitue was 33.24687080313229, sum of packet lengths in the flow was 5910.42, average packet length in the flow was 555.7412466732612, packet's length was 567.74, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83106910.62626705, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 47665.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313865.51761708, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314692.7052948, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83127805.30427511, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83343762.39949128, minimum packet length in the flow was 54.0, maximum packet length in the flow was 57.4, magnitue was 10.425904455821328, sum of packet lengths in the flow was 570.4, average packet length in the flow was 54.35288126476208, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.94, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313879.66228785, minimum packet length in the flow was 55.55, maximum packet length in the flow was 85.0, magnitue was 10.835405602424096, sum of packet lengths in the flow was 598.0, average packet length in the flow was 59.57649646857272, packet's length was 55.55, number of packets with RST flag set in the same flow was 0.99, number of packets with URG flag set in the same flow was 0.99 and the header length was 57.64, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 166612174.4337141, minimum packet length in the flow was 66.0, maximum packet length in the flow was 2962.0, magnitue was 49.46110229912661, sum of packet lengths in the flow was 18399.0, average packet length in the flow was 1228.0571901576236, packet's length was 66.0, number of packets with RST flag set in the same flow was 3965.5, number of packets with URG flag set in the same flow was 0.0 and the header length was 4565179.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 0.000130009651184, minimum packet length in the flow was 1514.0, maximum packet length in the flow was 2817.2, magnitue was 66.81718939684288, sum of packet lengths in the flow was 12671.0, average packet length in the flow was 2240.700634920635, packet's length was 2238.0, number of packets with RST flag set in the same flow was 277.5, number of packets with URG flag set in the same flow was 24.0 and the header length was 321794.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102140.00044103, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 13921.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128486.82116218, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150323.5400266, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83011728.19165915, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.4, magnitue was 10.015211118309423, sum of packet lengths in the flow was 527.6, average packet length in the flow was 50.15275664651826, packet's length was 50.4, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 43046.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83076262.43732266, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83063982.44059588, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83366513.96702227, minimum packet length in the flow was 282.4, maximum packet length in the flow was 1490.96, magnitue was 41.86215071421847, sum of packet lengths in the flow was 9095.94, average packet length in the flow was 885.0872276906531, packet's length was 863.99, number of packets with RST flag set in the same flow was 0.22, number of packets with URG flag set in the same flow was 0.04 and the header length was 234171.07, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83089457.02357864, minimum packet length in the flow was 78.04, maximum packet length in the flow was 131.88, magnitue was 14.301645496094467, sum of packet lengths in the flow was 1096.52, average packet length in the flow was 108.29802252529032, packet's length was 102.72, number of packets with RST flag set in the same flow was 0.6, number of packets with URG flag set in the same flow was 0.0 and the header length was 158.4, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098532.2784533, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 43151.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82972885.32778414, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83071589.3970132, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83088901.90572141, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314094.9062931, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 0.99 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82981160.54087786, minimum packet length in the flow was 60.81, maximum packet length in the flow was 182.04, magnitue was 11.865662192117634, sum of packet lengths in the flow was 703.21, average packet length in the flow was 78.10135792127548, packet's length was 60.85, number of packets with RST flag set in the same flow was 0.29, number of packets with URG flag set in the same flow was 0.13 and the header length was 320.51, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83677461.94404866, minimum packet length in the flow was 509.76, maximum packet length in the flow was 592.0, magnitue was 34.176728038642594, sum of packet lengths in the flow was 6133.76, average packet length in the flow was 584.2159514956148, packet's length was 586.86, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.0 and the header length was 15.72, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83365656.47743005, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 97.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83033920.0823168, minimum packet length in the flow was 54.0, maximum packet length in the flow was 59.7, magnitue was 10.4284791616419, sum of packet lengths in the flow was 572.7, average packet length in the flow was 54.38119969981, packet's length was 54.57, number of packets with RST flag set in the same flow was 0.15, number of packets with URG flag set in the same flow was 0.09 and the header length was 72.11, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314393.9147385, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102039.06022623, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.6, magnitue was 10.104139779495387, sum of packet lengths in the flow was 535.2, average packet length in the flow was 51.07531046095288, packet's length was 50.6, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 16185.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314531.67891039, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83033546.46880013, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83089055.00601703, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.32, magnitue was 10.394216180462802, sum of packet lengths in the flow was 567.32, average packet length in the flow was 54.01978115915732, packet's length was 54.04, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 55.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098355.72753291, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 25981.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128677.021701, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83015413.91718502, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 28375.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83090094.78130999, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83487413.60880823, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 16197.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362002.40366091, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 87.48, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83365610.99957003, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 85.86, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83028621.97384955, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2625.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83332023.03926012, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83068288.21518534, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83573983.11340456, minimum packet length in the flow was 552.4, maximum packet length in the flow was 578.0, magnitue was 33.95696546376525, sum of packet lengths in the flow was 6043.4, average packet length in the flow was 576.5689054007568, packet's length was 572.88, number of packets with RST flag set in the same flow was 0.06, number of packets with URG flag set in the same flow was 0.03 and the header length was 4.41, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83343803.07504068, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83344119.03654638, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82999226.70695065, minimum packet length in the flow was 148.8, maximum packet length in the flow was 1837.01, magnitue was 34.50740922922397, sum of packet lengths in the flow was 8413.42, average packet length in the flow was 760.8480553250499, packet's length was 818.24, number of packets with RST flag set in the same flow was 9.31, number of packets with URG flag set in the same flow was 4.63 and the header length was 9981.87, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83361869.84196982, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 87.48, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362038.51833373, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314688.43829803, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.56, magnitue was 10.409043557662358, sum of packet lengths in the flow was 569.82, average packet length in the flow was 54.17461551400096, packet's length was 54.36, number of packets with RST flag set in the same flow was 0.98, number of packets with URG flag set in the same flow was 0.96 and the header length was 53.74, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124078.27601758, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83007382.44880255, minimum packet length in the flow was 162.0, maximum packet length in the flow was 162.0, magnitue was 18.0, sum of packet lengths in the flow was 1701.0, average packet length in the flow was 162.0, packet's length was 162.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82973043.44147106, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.44, magnitue was 10.402451373054578, sum of packet lengths in the flow was 568.44, average packet length in the flow was 54.10558590171439, packet's length was 54.12, number of packets with RST flag set in the same flow was 0.14, number of packets with URG flag set in the same flow was 0.07 and the header length was 132.68, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313803.92887326, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83343734.42611748, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83006873.68546699, minimum packet length in the flow was 42.0, maximum packet length in the flow was 48.0, magnitue was 9.196863661446702, sum of packet lengths in the flow was 447.0, average packet length in the flow was 42.30789473684211, packet's length was 45.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 104.38, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83348135.0255232, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150657.95791045, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82925800.88727087, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 81.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102325.392442, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 29201.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83011722.91975613, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.8, magnitue was 10.004368934280578, sum of packet lengths in the flow was 525.8, average packet length in the flow was 50.04340213278294, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 7771.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.