input
stringlengths 492
558
| output
stringclasses 2
values | instruction
stringclasses 1
value |
---|---|---|
A network connection in which the time difference with the previous packet was 83331113.2694717, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83574187.54227006, minimum packet length in the flow was 506.24, maximum packet length in the flow was 578.0, magnitue was 33.8480718263561, sum of packet lengths in the flow was 5997.24, average packet length in the flow was 572.9495769970483, packet's length was 568.02, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83362350.08469841, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.96, magnitue was 10.401035956236472, sum of packet lengths in the flow was 567.96, average packet length in the flow was 54.09086437942862, packet's length was 54.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 143.1, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82955743.02038509, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83362298.15541159, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 159.3, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089243.16026275, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128699.365258, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83093357.02189012, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.02, magnitue was 10.402469445310864, sum of packet lengths in the flow was 568.02, average packet length in the flow was 54.105864379428624, packet's length was 54.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 53.46, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83097802.63845545, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.72, magnitue was 10.00933544779812, sum of packet lengths in the flow was 526.72, average packet length in the flow was 50.09331458548331, packet's length was 50.43, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 16655.43, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344990.70614322, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83072363.40414514, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.28, magnitue was 10.393920523966534, sum of packet lengths in the flow was 567.28, average packet length in the flow was 54.01670423608039, packet's length was 54.04, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.04, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149555.92232317, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83767587.4078561, minimum packet length in the flow was 474.96, maximum packet length in the flow was 554.0, magnitue was 33.0554008651259, sum of packet lengths in the flow was 5737.96, average packet length in the flow was 546.5188327603769, packet's length was 549.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 5147845.56, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 1.8382072448730467e-05, minimum packet length in the flow was 94.0, maximum packet length in the flow was 94.0, magnitue was 13.711309200802088, sum of packet lengths in the flow was 517.0, average packet length in the flow was 94.0, packet's length was 94.0, number of packets with RST flag set in the same flow was 6561.5, number of packets with URG flag set in the same flow was 2527.0 and the header length was 7983377.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089796.9416455, minimum packet length in the flow was 54.0, maximum packet length in the flow was 63.38, magnitue was 10.464490814735004, sum of packet lengths in the flow was 576.38, average packet length in the flow was 54.76898557028626, packet's length was 54.67, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.67, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83097619.99075305, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.64, magnitue was 10.0, sum of packet lengths in the flow was 526.64, average packet length in the flow was 50.082, packet's length was 51.64, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 39829.78, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83702711.95533365, minimum packet length in the flow was 546.82, maximum packet length in the flow was 592.0, magnitue was 34.1820381812709, sum of packet lengths in the flow was 6095.52, average packet length in the flow was 584.5202140900896, packet's length was 576.94, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2.7, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83677168.19152598, minimum packet length in the flow was 592.0, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6216.0, average packet length in the flow was 592.0, packet's length was 592.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344210.14327401, minimum packet length in the flow was 54.0, maximum packet length in the flow was 66.65, magnitue was 10.49092726939708, sum of packet lengths in the flow was 580.98, average packet length in the flow was 55.04669267316791, packet's length was 55.3, number of packets with RST flag set in the same flow was 0.07, number of packets with URG flag set in the same flow was 0.03 and the header length was 64.14, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83340918.77595012, minimum packet length in the flow was 54.0, maximum packet length in the flow was 56.88, magnitue was 10.41000767751869, sum of packet lengths in the flow was 569.88, average packet length in the flow was 54.18491593992523, packet's length was 54.32, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 53.46, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82985450.7783001, minimum packet length in the flow was 54.36, maximum packet length in the flow was 57.73, magnitue was 10.50152222224941, sum of packet lengths in the flow was 575.17, average packet length in the flow was 55.17702805257178, packet's length was 54.43, number of packets with RST flag set in the same flow was 0.15, number of packets with URG flag set in the same flow was 0.05 and the header length was 72.41, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361238.87246881, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 69.12, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124756.41364798, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83332095.44929336, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345178.76354523, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124626.92816243, minimum packet length in the flow was 42.01, maximum packet length in the flow was 42.2, magnitue was 9.169069440446396, sum of packet lengths in the flow was 441.2, average packet length in the flow was 42.03597739657143, packet's length was 42.01, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.43, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83015909.44850671, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 31986.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.0116486072540283, minimum packet length in the flow was 138.0, maximum packet length in the flow was 10937.1, magnitue was 82.03436645429656, sum of packet lengths in the flow was 19767.5, average packet length in the flow was 3645.416865079365, packet's length was 2747.9, number of packets with RST flag set in the same flow was 924.7, number of packets with URG flag set in the same flow was 327.2 and the header length was 387376.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128040.91477461, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361190.70923094, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 146.88, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331048.23047556, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344984.72062217, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83340753.74800718, minimum packet length in the flow was 308.65, maximum packet length in the flow was 1468.4, magnitue was 40.07699129411929, sum of packet lengths in the flow was 8514.26, average packet length in the flow was 819.9166299099077, packet's length was 819.18, number of packets with RST flag set in the same flow was 1.28, number of packets with URG flag set in the same flow was 0.58 and the header length was 856.12, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83033260.1004949, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 27075.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83313815.94087888, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83067372.1356138, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.8, magnitue was 10.396510541538868, sum of packet lengths in the flow was 567.8, average packet length in the flow was 54.04340213278294, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.2, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83362042.30358101, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102139.89830022, minimum packet length in the flow was 50.0, maximum packet length in the flow was 69.6, magnitue was 10.371418961770004, sum of packet lengths in the flow was 567.5, average packet length in the flow was 53.91714481828801, packet's length was 52.78, number of packets with RST flag set in the same flow was 0.05, number of packets with URG flag set in the same flow was 0.03 and the header length was 33901.52, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83067570.55401894, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.08, magnitue was 10.40206928361354, sum of packet lengths in the flow was 568.89, average packet length in the flow was 54.10130340557275, packet's length was 54.54, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 56.16, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83249123.93701339, minimum packet length in the flow was 408.0, maximum packet length in the flow was 1514.0, magnitue was 44.56819386426775, sum of packet lengths in the flow was 10079.32, average packet length in the flow was 995.7825755546912, packet's length was 936.55, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 6.51, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83090114.58570509, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348461.63967079, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83088890.89379255, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361983.38517578, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83007294.61966611, minimum packet length in the flow was 182.0, maximum packet length in the flow was 182.0, magnitue was 19.078784028338912, sum of packet lengths in the flow was 1911.0, average packet length in the flow was 182.0, packet's length was 182.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 182.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331247.66294219, minimum packet length in the flow was 54.0, maximum packet length in the flow was 56.8, magnitue was 10.414259977434307, sum of packet lengths in the flow was 569.8, average packet length in the flow was 54.22954793142873, packet's length was 54.2, number of packets with RST flag set in the same flow was 1.98, number of packets with URG flag set in the same flow was 1.98 and the header length was 107.66, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83483268.58152485, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361860.10617739, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83076372.29384631, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82943429.3385935, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83016559.57970893, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 18425.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.0006494998931884, minimum packet length in the flow was 117.0, maximum packet length in the flow was 684.0, magnitue was 21.244045076607307, sum of packet lengths in the flow was 972.0, average packet length in the flow was 244.86214285714283, packet's length was 128.1, number of packets with RST flag set in the same flow was 1350.2, number of packets with URG flag set in the same flow was 56.0 and the header length was 1470512.4, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83132093.11407329, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82947071.47463521, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83098903.88344613, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 29966.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83034061.14037721, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124633.59140313, minimum packet length in the flow was 42.0, maximum packet length in the flow was 130.32, magnitue was 9.573225689055109, sum of packet lengths in the flow was 529.32, average packet length in the flow was 47.09573030615756, packet's length was 56.72, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 15.14, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83483225.12177809, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83313733.89161532, minimum packet length in the flow was 54.0, maximum packet length in the flow was 56.7, magnitue was 10.411456648992424, sum of packet lengths in the flow was 570.5, average packet length in the flow was 54.20050150498796, packet's length was 54.61, number of packets with RST flag set in the same flow was 0.98, number of packets with URG flag set in the same flow was 0.98 and the header length was 60.26, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83093448.05692998, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123828.49126375, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 20475.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128177.31573614, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345189.50687246, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331863.94415352, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089710.50461258, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83008105.27777658, minimum packet length in the flow was 162.0, maximum packet length in the flow was 188.64, magnitue was 18.070910907875763, sum of packet lengths in the flow was 1740.96, average packet length in the flow was 164.03305263157893, packet's length was 188.64, number of packets with RST flag set in the same flow was 0.97, number of packets with URG flag set in the same flow was 0.12 and the header length was 987.84, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83033920.07488813, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124628.045707, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83002825.43349248, minimum packet length in the flow was 77.34, maximum packet length in the flow was 425.03, magnitue was 15.422469136097432, sum of packet lengths in the flow was 1450.91, average packet length in the flow was 132.0911693653783, packet's length was 144.19, number of packets with RST flag set in the same flow was 12.07, number of packets with URG flag set in the same flow was 4.14 and the header length was 10737.89, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331070.95797223, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123740.68834372, minimum packet length in the flow was 50.0, maximum packet length in the flow was 54.9, magnitue was 10.064993154945284, sum of packet lengths in the flow was 535.01, average packet length in the flow was 50.66751046760257, packet's length was 51.02, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 25854.88, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83034127.79556783, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82985898.75627048, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 109.12, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150259.38216476, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331865.72130002, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83677460.00615281, minimum packet length in the flow was 499.56, maximum packet length in the flow was 592.0, magnitue was 34.213056214804304, sum of packet lengths in the flow was 6123.56, average packet length in the flow was 585.3915650431439, packet's length was 581.8, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2.54, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83098753.8752701, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 28466.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102236.24077448, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 18445.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83012289.25148077, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 9475.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331686.9570876, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123490.62692559, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54805.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314369.3399642, minimum packet length in the flow was 54.0, maximum packet length in the flow was 64.29, magnitue was 10.51776831650179, sum of packet lengths in the flow was 577.29, average packet length in the flow was 55.3649735093338, packet's length was 54.57, number of packets with RST flag set in the same flow was 0.98, number of packets with URG flag set in the same flow was 0.98 and the header length was 54.86, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83008133.19933389, minimum packet length in the flow was 162.0, maximum packet length in the flow was 162.0, magnitue was 18.0, sum of packet lengths in the flow was 1701.0, average packet length in the flow was 162.0, packet's length was 162.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83650792.6733136, minimum packet length in the flow was 543.07, maximum packet length in the flow was 578.0, magnitue was 33.88490471274438, sum of packet lengths in the flow was 6004.49, average packet length in the flow was 574.2103162501843, packet's length was 568.07, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.85, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83343809.94770166, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149563.52410318, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83677173.68903148, minimum packet length in the flow was 592.0, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6216.0, average packet length in the flow was 592.0, packet's length was 592.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82925071.94649664, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.32, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83012286.08884592, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.28, magnitue was 10.026326015781756, sum of packet lengths in the flow was 528.28, average packet length in the flow was 50.2647432320002, packet's length was 50.24, number of packets with RST flag set in the same flow was 0.04, number of packets with URG flag set in the same flow was 0.0 and the header length was 34035.48, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314567.50881936, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83495216.14640072, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 39625.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314303.6664705, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.8, magnitue was 10.403408872989578, sum of packet lengths in the flow was 568.8, average packet length in the flow was 54.11557246245327, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.99, number of packets with URG flag set in the same flow was 0.99 and the header length was 54.2, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83694016.6414968, minimum packet length in the flow was 499.27, maximum packet length in the flow was 592.0, magnitue was 34.21568925338792, sum of packet lengths in the flow was 6123.27, average packet length in the flow was 585.1081105381546, packet's length was 574.13, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345192.71807134, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124768.45268732, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82943064.68025759, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102449.97364864, minimum packet length in the flow was 49.88, maximum packet length in the flow was 109.75, magnitue was 10.34145335975824, sum of packet lengths in the flow was 606.91, average packet length in the flow was 54.542574346405225, packet's length was 67.48, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 8708.93, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83365581.43421228, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 73.44, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83349229.58777162, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361030.38273996, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 145.8, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
Subsets and Splits