input
stringlengths 492
558
| output
stringclasses 2
values | instruction
stringclasses 1
value |
---|---|---|
A network connection in which the time difference with the previous packet was 83064138.8843642, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83068530.77984428, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83693719.82350753, minimum packet length in the flow was 586.98, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6210.98, average packet length in the flow was 591.749, packet's length was 586.98, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.9, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106916.68201482, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 40675.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128054.24923481, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83008134.74291866, minimum packet length in the flow was 162.0, maximum packet length in the flow was 162.0, magnitue was 18.0, sum of packet lengths in the flow was 1701.0, average packet length in the flow was 162.0, packet's length was 162.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83077027.55603243, minimum packet length in the flow was 54.0, maximum packet length in the flow was 56.6, magnitue was 10.411546125279743, sum of packet lengths in the flow was 569.6, average packet length in the flow was 54.20097650285731, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.94, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83343757.48229304, minimum packet length in the flow was 54.0, maximum packet length in the flow was 68.08, magnitue was 10.472564003155076, sum of packet lengths in the flow was 581.08, average packet length in the flow was 54.87037100292209, packet's length was 55.76, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 55.76, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331733.75150442, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345084.75805187, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82946965.62407099, minimum packet length in the flow was 54.0, maximum packet length in the flow was 62.16, magnitue was 10.471666005836942, sum of packet lengths in the flow was 575.16, average packet length in the flow was 54.84691503542896, packet's length was 54.48, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 117.14, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83003532.03953506, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 42.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82943067.37199257, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83011537.75278758, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.2, magnitue was 10.077618517690851, sum of packet lengths in the flow was 534.0, average packet length in the flow was 50.79531046095288, packet's length was 50.6, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 3977.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83098811.40567113, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 26743.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83093452.0059755, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83332036.00727633, minimum packet length in the flow was 54.0, maximum packet length in the flow was 66.16, magnitue was 10.499172498928436, sum of packet lengths in the flow was 579.16, average packet length in the flow was 55.15094880609587, packet's length was 54.76, number of packets with RST flag set in the same flow was 1.96, number of packets with URG flag set in the same flow was 1.92 and the header length was 117.98, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345194.27121073, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82972877.45113668, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149507.89205848, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83332095.49328087, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83693933.04898421, minimum packet length in the flow was 370.18, maximum packet length in the flow was 592.0, magnitue was 33.79436933308707, sum of packet lengths in the flow was 5984.76, average packet length in the flow was 571.4844649946717, packet's length was 566.25, number of packets with RST flag set in the same flow was 0.05, number of packets with URG flag set in the same flow was 0.01 and the header length was 10.91, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124419.92509003, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102809.02555856, minimum packet length in the flow was 50.0, maximum packet length in the flow was 55.0, magnitue was 10.027457093706252, sum of packet lengths in the flow was 530.0, average packet length in the flow was 50.27951066391469, packet's length was 51.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 14573.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345171.35618748, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089227.0307872, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361342.30451177, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 102.6, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83343737.84998278, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83088806.28170554, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348624.56557654, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83076017.82907249, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314379.70215578, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83097806.820923, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 34049.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345137.57345818, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83693988.93039791, minimum packet length in the flow was 557.3, maximum packet length in the flow was 592.0, magnitue was 34.310463845778806, sum of packet lengths in the flow was 6159.58, average packet length in the flow was 588.6950680623127, packet's length was 583.2, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 3.82, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83064139.82047617, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.08, magnitue was 10.40437644929932, sum of packet lengths in the flow was 568.08, average packet length in the flow was 54.12586437942862, packet's length was 54.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 53.46, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82985552.30481449, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.78, magnitue was 10.398108225176069, sum of packet lengths in the flow was 567.78, average packet length in the flow was 54.06029295085719, packet's length was 54.06, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 53.46, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.006198501586914, minimum packet length in the flow was 934.8, maximum packet length in the flow was 2672.4, magnitue was 54.19672279629003, sum of packet lengths in the flow was 8200.2, average packet length in the flow was 1483.1476190476192, packet's length was 2247.0, number of packets with RST flag set in the same flow was 389.8, number of packets with URG flag set in the same flow was 104.3 and the header length was 288966.7, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348303.7541267, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83348458.23534831, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83487419.99871933, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 33689.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83101854.76149082, minimum packet length in the flow was 50.0, maximum packet length in the flow was 52.6, magnitue was 10.085241638062865, sum of packet lengths in the flow was 537.6, average packet length in the flow was 50.87893982522466, packet's length was 51.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 14529.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83068265.34952441, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.011735987663269, minimum packet length in the flow was 63.6, maximum packet length in the flow was 91.6, magnitue was 12.245910472794987, sum of packet lengths in the flow was 402.6, average packet length in the flow was 75.07650793650794, packet's length was 74.8, number of packets with RST flag set in the same flow was 4.1, number of packets with URG flag set in the same flow was 2.0 and the header length was 346.8, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150715.81763871, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83361982.38963184, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 101.52, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83098897.88398087, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 18281.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331190.50757404, minimum packet length in the flow was 54.0, maximum packet length in the flow was 61.04, magnitue was 10.42796959615084, sum of packet lengths in the flow was 574.04, average packet length in the flow was 54.38193876848985, packet's length was 55.76, number of packets with RST flag set in the same flow was 0.99, number of packets with URG flag set in the same flow was 0.99 and the header length was 55.76, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83072296.71276504, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.0124490022659301, minimum packet length in the flow was 50.8, maximum packet length in the flow was 118.4, magnitue was 11.498597110403804, sum of packet lengths in the flow was 379.4, average packet length in the flow was 66.34722222222221, packet's length was 67.8, number of packets with RST flag set in the same flow was 1203.2, number of packets with URG flag set in the same flow was 137.0 and the header length was 1210481.2, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83314317.39859337, minimum packet length in the flow was 54.0, maximum packet length in the flow was 57.06, magnitue was 10.43265582550037, sum of packet lengths in the flow was 574.65, average packet length in the flow was 54.42977631578948, packet's length was 55.53, number of packets with RST flag set in the same flow was 0.97, number of packets with URG flag set in the same flow was 0.97 and the header length was 58.91, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150270.34840071, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83098891.75122403, minimum packet length in the flow was 50.0, maximum packet length in the flow was 64.76, magnitue was 10.102673939993055, sum of packet lengths in the flow was 541.92, average packet length in the flow was 51.08121701642871, packet's length was 51.91, number of packets with RST flag set in the same flow was 0.11, number of packets with URG flag set in the same flow was 0.08 and the header length was 33790.14, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83132088.4090388, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106697.84111726, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.8, magnitue was 10.004955977743132, sum of packet lengths in the flow was 525.8, average packet length in the flow was 50.049452897893296, packet's length was 50.1, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 30808.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83088900.9419188, minimum packet length in the flow was 56.08, maximum packet length in the flow was 89.8, magnitue was 10.96486410659208, sum of packet lengths in the flow was 612.96, average packet length in the flow was 61.279399174097314, packet's length was 56.52, number of packets with RST flag set in the same flow was 0.3, number of packets with URG flag set in the same flow was 0.0 and the header length was 89.64, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102153.94786805, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.36, magnitue was 10.019885561675284, sum of packet lengths in the flow was 528.36, average packet length in the flow was 50.20045083296476, packet's length was 50.48, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 32125.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089756.47801667, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.6, magnitue was 10.392304845413264, sum of packet lengths in the flow was 568.6, average packet length in the flow was 54.08, packet's length was 55.6, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 55.6, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83076444.9458528, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83033262.85136025, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.8, magnitue was 10.02083417121854, sum of packet lengths in the flow was 526.8, average packet length in the flow was 50.20977396571437, packet's length was 50.1, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 45589.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83124077.8017422, minimum packet length in the flow was 42.0, maximum packet length in the flow was 44.34, magnitue was 9.184763854776302, sum of packet lengths in the flow was 443.34, average packet length in the flow was 42.18087885257157, packet's length was 42.18, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83007008.68863483, minimum packet length in the flow was 158.8, maximum packet length in the flow was 185.73, magnitue was 18.85183598217237, sum of packet lengths in the flow was 1892.69, average packet length in the flow was 178.0844670269531, packet's length was 182.47, number of packets with RST flag set in the same flow was 0.1, number of packets with URG flag set in the same flow was 0.04 and the header length was 207.66, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83370603.00177622, minimum packet length in the flow was 291.77, maximum packet length in the flow was 1467.92, magnitue was 41.93599333015468, sum of packet lengths in the flow was 9479.25, average packet length in the flow was 888.7198496555473, packet's length was 918.71, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 629101.06, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83128380.97851263, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83330874.4718215, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83132735.64706065, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82946395.50070177, minimum packet length in the flow was 54.0, maximum packet length in the flow was 57.78, magnitue was 10.423463440215976, sum of packet lengths in the flow was 571.08, average packet length in the flow was 54.32666034726368, packet's length was 54.33, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 110.86, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102214.42938581, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 46025.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344959.43676558, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83677066.55564396, minimum packet length in the flow was 592.0, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6216.0, average packet length in the flow was 592.0, packet's length was 592.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83016304.75512435, minimum packet length in the flow was 50.0, maximum packet length in the flow was 62.54, magnitue was 10.068915357210152, sum of packet lengths in the flow was 537.54, average packet length in the flow was 50.72351062091503, packet's length was 52.09, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 22871.59, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331771.8554973, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83012231.24860479, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 24675.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83097808.99319433, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 21547.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83150123.21635635, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83344288.23029627, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123744.6212656, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 4075.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83103025.26074073, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 21487.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83330943.95227645, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82942697.74508716, minimum packet length in the flow was 73.04, maximum packet length in the flow was 352.52, magnitue was 13.78638853622182, sum of packet lengths in the flow was 1071.64, average packet length in the flow was 121.2180325043034, packet's length was 119.52, number of packets with RST flag set in the same flow was 0.14, number of packets with URG flag set in the same flow was 0.01 and the header length was 95997.54, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83003533.92502344, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 42.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82955806.13020323, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83006954.63903007, minimum packet length in the flow was 182.0, maximum packet length in the flow was 182.0, magnitue was 19.078784028338912, sum of packet lengths in the flow was 1911.0, average packet length in the flow was 182.0, packet's length was 182.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 182.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82981664.08352251, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82985966.65471245, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83076430.83417803, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83340900.93383995, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.52, magnitue was 10.392304845413264, sum of packet lengths in the flow was 568.52, average packet length in the flow was 54.076, packet's length was 55.52, number of packets with RST flag set in the same flow was 0.03, number of packets with URG flag set in the same flow was 0.02 and the header length was 56.91, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83340876.39160295, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83313988.95713028, minimum packet length in the flow was 54.0, maximum packet length in the flow was 55.32, magnitue was 10.401176195921648, sum of packet lengths in the flow was 568.32, average packet length in the flow was 54.09225256838104, packet's length was 54.12, number of packets with RST flag set in the same flow was 1.08, number of packets with URG flag set in the same flow was 1.03 and the header length was 100.82, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83149555.977551, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 82973031.53530866, minimum packet length in the flow was 54.0, maximum packet length in the flow was 80.7, magnitue was 10.616094451524807, sum of packet lengths in the flow was 607.78, average packet length in the flow was 56.586297992684976, packet's length was 58.72, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 116.65, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 0.006471300125122, minimum packet length in the flow was 351.6, maximum packet length in the flow was 1496.0, magnitue was 46.733007895135415, sum of packet lengths in the flow was 5648.6, average packet length in the flow was 1100.99, packet's length was 1067.6, number of packets with RST flag set in the same flow was 217.1, number of packets with URG flag set in the same flow was 13.8 and the header length was 220082.3, was a non-DoS attack. | non-DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83345192.78113592, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83089964.68978454, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331071.51110089, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83102992.80895896, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 25728.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83106372.40314159, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.9, magnitue was 10.005785867491497, sum of packet lengths in the flow was 525.9, average packet length in the flow was 50.05778623122664, packet's length was 50.1, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 42718.5, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83123501.23889023, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 25385.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331129.97925702, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
A network connection in which the time difference with the previous packet was 83331861.79463193, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack. | DoS | Using the input data predict whether the intrusion is a DoS or a non-DoS attack. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.