input
stringlengths 492
558
| output
stringclasses 2
values | instruction
stringclasses 1
value |
---|---|---|
A network connection in which the time difference with the previous packet was 83149700.39217216, minimum packet length in the flow was 42.0, maximum packet length in the flow was 44.88, magnitue was 9.194591829070845, sum of packet lengths in the flow was 443.88, average packet length in the flow was 42.27259313828586, packet's length was 42.18, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149559.46902585, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123739.43081504, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 16165.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331811.85313188, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82956072.89691316, minimum packet length in the flow was 54.0, maximum packet length in the flow was 57.6, magnitue was 10.43213281831292, sum of packet lengths in the flow was 570.6, average packet length in the flow was 54.41954793142873, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.94, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128517.07556416, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82951232.80023858, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128152.4692921, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83366625.32430115, minimum packet length in the flow was 352.38, maximum packet length in the flow was 1467.92, magnitue was 42.19613741053988, sum of packet lengths in the flow was 9608.98, average packet length in the flow was 897.1173174719157, packet's length was 923.46, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 117153.32, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344996.14868407, minimum packet length in the flow was 53.48, maximum packet length in the flow was 54.0, magnitue was 10.388420868801678, sum of packet lengths in the flow was 566.48, average packet length in the flow was 53.95980469942853, packet's length was 53.96, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 107.46, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128576.1457901, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82977134.56410824, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.4, magnitue was 10.394320858622947, sum of packet lengths in the flow was 567.4, average packet length in the flow was 54.02052631578948, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.4, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 166439321.9152386, minimum packet length in the flow was 66.0, maximum packet length in the flow was 3322.0, magnitue was 27.77418086267328, sum of packet lengths in the flow was 6113.3, average packet length in the flow was 387.7336570477166, packet's length was 461.4, number of packets with RST flag set in the same flow was 4.5, number of packets with URG flag set in the same flow was 1.1 and the header length was 3048.5, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82985621.3933825, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.06, number of packets with URG flag set in the same flow was 0.0 and the header length was 58.98, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83784637.21870299, minimum packet length in the flow was 554.0, maximum packet length in the flow was 554.0, magnitue was 33.28663395418648, sum of packet lengths in the flow was 5817.0, average packet length in the flow was 554.0, packet's length was 554.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2369075.74, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83365552.34955302, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 103.14, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83011841.37563203, minimum packet length in the flow was 50.0, maximum packet length in the flow was 55.2, magnitue was 10.141535979019318, sum of packet lengths in the flow was 546.4, average packet length in the flow was 51.47142713237915, packet's length was 52.4, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 17314.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124710.5231917, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83336190.64217924, minimum packet length in the flow was 431.0, maximum packet length in the flow was 1514.0, magnitue was 44.78821111580633, sum of packet lengths in the flow was 10197.0, average packet length in the flow was 1004.7977826095472, packet's length was 944.0, number of packets with RST flag set in the same flow was 0.5, number of packets with URG flag set in the same flow was 0.0 and the header length was 757.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83033987.00408387, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106924.44863899, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 4956.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348617.8846292, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128984.63830662, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361410.25532672, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 181.44, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82955891.7656055, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124161.53999919, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83107466.14500263, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 13098.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089452.0835861, minimum packet length in the flow was 66.12, maximum packet length in the flow was 163.79, magnitue was 16.386242615085745, sum of packet lengths in the flow was 1491.38, average packet length in the flow was 136.5098693777413, packet's length was 144.15, number of packets with RST flag set in the same flow was 0.32, number of packets with URG flag set in the same flow was 0.02 and the header length was 190.66, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83362218.84499551, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149460.45443405, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314678.91047879, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82973044.0257077, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.44, magnitue was 10.402451373054578, sum of packet lengths in the flow was 568.44, average packet length in the flow was 54.10558590171439, packet's length was 54.12, number of packets with RST flag set in the same flow was 0.14, number of packets with URG flag set in the same flow was 0.1 and the header length was 140.27, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83362318.91396749, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150689.48980908, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83153707.60878819, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82942898.48373872, minimum packet length in the flow was 53.72, maximum packet length in the flow was 54.0, magnitue was 10.39068552603265, sum of packet lengths in the flow was 566.72, average packet length in the flow was 53.98329576391961, packet's length was 53.96, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 53.96, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83007444.63894132, minimum packet length in the flow was 182.0, maximum packet length in the flow was 182.0, magnitue was 19.078784028338912, sum of packet lengths in the flow was 1911.0, average packet length in the flow was 182.0, packet's length was 182.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 182.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348165.10252747, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124893.037386, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83011920.38942918, minimum packet length in the flow was 50.0, maximum packet length in the flow was 57.78, magnitue was 10.087755349006596, sum of packet lengths in the flow was 534.38, average packet length in the flow was 50.90335566781001, packet's length was 50.58, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 29032.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83651077.20670637, minimum packet length in the flow was 400.2, maximum packet length in the flow was 562.76, magnitue was 31.16762886303008, sum of packet lengths in the flow was 5256.2, average packet length in the flow was 498.0388012441635, packet's length was 501.8, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.0072922945022583, minimum packet length in the flow was 66.7, maximum packet length in the flow was 962.4, magnitue was 21.259354720434384, sum of packet lengths in the flow was 1655.1, average packet length in the flow was 246.47051587301584, packet's length was 407.7, number of packets with RST flag set in the same flow was 41.7, number of packets with URG flag set in the same flow was 2.0 and the header length was 34413.8, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150160.79819639, minimum packet length in the flow was 42.0, maximum packet length in the flow was 46.41, magnitue was 9.195610312585377, sum of packet lengths in the flow was 445.41, average packet length in the flow was 42.28315253301051, packet's length was 42.49, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2.6, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348250.82235427, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83132318.71840802, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83762948.37246522, minimum packet length in the flow was 554.0, maximum packet length in the flow was 554.0, magnitue was 33.28663395418648, sum of packet lengths in the flow was 5817.0, average packet length in the flow was 554.0, packet's length was 554.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 1583055.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82980902.15493456, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83349150.03651845, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106607.58042593, minimum packet length in the flow was 50.0, maximum packet length in the flow was 52.4, magnitue was 10.025433490848776, sum of packet lengths in the flow was 527.96, average packet length in the flow was 50.25621459809541, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.0 and the header length was 25961.94, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331318.81071769, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82943186.23346749, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.68, magnitue was 10.399089505885163, sum of packet lengths in the flow was 567.68, average packet length in the flow was 54.070576252952414, packet's length was 54.04, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 56.28, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83663690.32730208, minimum packet length in the flow was 241.19, maximum packet length in the flow was 578.0, magnitue was 32.71200086455712, sum of packet lengths in the flow was 5555.11, average packet length in the flow was 536.1180768905159, packet's length was 534.98, number of packets with RST flag set in the same flow was 0.07, number of packets with URG flag set in the same flow was 0.0 and the header length was 22.89, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089816.34922577, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344065.59142803, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83651092.50240201, minimum packet length in the flow was 578.0, maximum packet length in the flow was 578.0, magnitue was 34.0, sum of packet lengths in the flow was 6069.0, average packet length in the flow was 578.0, packet's length was 578.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345098.94291103, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314739.18708152, minimum packet length in the flow was 56.47, maximum packet length in the flow was 103.4, magnitue was 11.05151801384335, sum of packet lengths in the flow was 616.4, average packet length in the flow was 62.88641695314491, packet's length was 56.47, number of packets with RST flag set in the same flow was 1.01, number of packets with URG flag set in the same flow was 0.99 and the header length was 74.17, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83037116.6453972, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83132299.63552415, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82972879.90232937, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089861.66636088, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124426.94312696, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361856.11676745, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 124.2, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331317.23374996, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83071588.52381524, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83097629.20167376, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 23235.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149645.50071175, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102141.1162664, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 5385.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83067519.92869252, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 166854628.9369922, minimum packet length in the flow was 66.0, maximum packet length in the flow was 5650.0, magnitue was 52.97342213386558, sum of packet lengths in the flow was 21404.6, average packet length in the flow was 1399.574133138963, packet's length was 903.6, number of packets with RST flag set in the same flow was 977.3, number of packets with URG flag set in the same flow was 9.6 and the header length was 1546257.8, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106701.50070195, minimum packet length in the flow was 50.0, maximum packet length in the flow was 54.32, magnitue was 10.030555947282355, sum of packet lengths in the flow was 529.92, average packet length in the flow was 50.30901133678842, packet's length was 50.68, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 22806.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83007886.16610727, minimum packet length in the flow was 154.72, maximum packet length in the flow was 260.4, magnitue was 18.28123538704094, sum of packet lengths in the flow was 1792.12, average packet length in the flow was 167.6326850700469, packet's length was 173.39, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 200.52, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331041.28820458, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150009.5108616, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83253932.03232995, minimum packet length in the flow was 396.56, maximum packet length in the flow was 1490.96, magnitue was 43.45736475030324, sum of packet lengths in the flow was 9883.56, average packet length in the flow was 949.071551853719, packet's length was 926.48, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83002639.41566437, minimum packet length in the flow was 251.88, maximum packet length in the flow was 2316.95, magnitue was 41.97463138745288, sum of packet lengths in the flow was 9747.08, average packet length in the flow was 982.6834198412956, packet's length was 873.3, number of packets with RST flag set in the same flow was 11.99, number of packets with URG flag set in the same flow was 3.31 and the header length was 14262.06, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83011710.61674352, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.2, magnitue was 10.0, sum of packet lengths in the flow was 525.2, average packet length in the flow was 50.01, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 40144.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83313888.32857044, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124425.51114847, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83127984.69558904, minimum packet length in the flow was 42.0, maximum packet length in the flow was 51.87, magnitue was 9.278732911289769, sum of packet lengths in the flow was 450.87, average packet length in the flow was 43.065711604571895, packet's length was 42.57, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 8.34, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149812.74616018, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83072077.76248212, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83090100.77247332, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82972897.61743367, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314429.60230887, minimum packet length in the flow was 54.0, maximum packet length in the flow was 78.0, magnitue was 10.582026688941282, sum of packet lengths in the flow was 591.0, average packet length in the flow was 56.10305011809656, packet's length was 55.6, number of packets with RST flag set in the same flow was 0.99, number of packets with URG flag set in the same flow was 0.99 and the header length was 55.6, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83064224.1787671, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314373.65423942, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83340188.52065812, minimum packet length in the flow was 415.16, maximum packet length in the flow was 1502.6, magnitue was 44.17045552605912, sum of packet lengths in the flow was 10055.76, average packet length in the flow was 979.0849590394126, packet's length was 928.81, number of packets with RST flag set in the same flow was 0.55, number of packets with URG flag set in the same flow was 0.01 and the header length was 750.79, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124636.72938783, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82972875.16452913, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83330884.24640103, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82946988.39959599, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.2, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.2, average packet length in the flow was 54.01, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 107.66, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83037240.947467, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123576.95541961, minimum packet length in the flow was 50.0, maximum packet length in the flow was 52.88, magnitue was 10.017698533478242, sum of packet lengths in the flow was 527.88, average packet length in the flow was 50.17803043241588, packet's length was 50.36, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 35784.86, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128985.8543434, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83008161.87988919, minimum packet length in the flow was 154.08, maximum packet length in the flow was 162.0, magnitue was 17.971360532582175, sum of packet lengths in the flow was 1693.08, average packet length in the flow was 161.4914811652056, packet's length was 161.12, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.6, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089923.52048051, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.0052172899246215, minimum packet length in the flow was 350.8, maximum packet length in the flow was 1514.0, magnitue was 37.87725260764006, sum of packet lengths in the flow was 3109.4, average packet length in the flow was 768.5718253968254, packet's length was 355.0, number of packets with RST flag set in the same flow was 4561.2, number of packets with URG flag set in the same flow was 190.8 and the header length was 4759529.5, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150163.95421647, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83037253.36187322, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.