Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Dataset . 2021
License: CC BY
Data sources: Datacite
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Dataset . 2021
License: CC BY
Data sources: ZENODO
addClaim

Slow Port Scan Test (D2)

Authors: Ignacio Crespo; Adrián Campazas;

Slow Port Scan Test (D2)

Abstract

Ports scan dataset contains approximately 50% benign flow data and 50% malicious flow data. Benign flow data have been generated with the same python scripts used in D1 and has been labeled as '0'. Malicious flow data has been labeled as '1'. Malicious flow data has been generated using Nmap tool. Different types of slow port scans have been launched on both TCP and UDP ports. The scans carried out were: TCP SYN scanning; TCP Connect scanning; UDP scanning; TCP NULL; FIN; Xmas scanning; TCP ACK scanning; TCP Window scanning; and TCP Maimon scanning. Slow port-scanning attacks have been carried out by 100 attack nodes that scanned 65536 ports on 200 victim nodes. Requests are launched with 5 to 10 seconds of slack time among them.

Keywords

NetFlow, DOROTHEA, Network attacks, Dataset, Network traffic

  • OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 13
    download downloads 9
  • 13
    views
    9
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
13
9