input
stringlengths
492
558
output
stringclasses
2 values
instruction
stringclasses
1 value
A network connection in which the time difference with the previous packet was 83016003.47972487, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 14225.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83008181.13802585, minimum packet length in the flow was 162.0, maximum packet length in the flow was 162.0, magnitue was 18.0, sum of packet lengths in the flow was 1701.0, average packet length in the flow was 162.0, packet's length was 162.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 162.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 0.0164779901504516, minimum packet length in the flow was 66.0, maximum packet length in the flow was 113.2, magnitue was 12.31615177962993, sum of packet lengths in the flow was 441.8, average packet length in the flow was 76.10194444444444, packet's length was 85.3, number of packets with RST flag set in the same flow was 98.2, number of packets with URG flag set in the same flow was 18.4 and the header length was 70024.8, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128047.2500316, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83011558.03874609, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 38575.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82973029.8495537, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128866.9953257, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128168.68150607, minimum packet length in the flow was 42.0, maximum packet length in the flow was 246.4, magnitue was 10.417718462640623, sum of packet lengths in the flow was 895.16, average packet length in the flow was 67.05072922502335, packet's length was 173.76, number of packets with RST flag set in the same flow was 7.05, number of packets with URG flag set in the same flow was 0.3 and the header length was 7966.02, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83245257.25974964, minimum packet length in the flow was 139.28, maximum packet length in the flow was 1485.36, magnitue was 44.82171467924225, sum of packet lengths in the flow was 10784.76, average packet length in the flow was 1018.159335503506, packet's length was 1027.12, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83089974.61003202, minimum packet length in the flow was 54.0, maximum packet length in the flow was 57.8, magnitue was 10.441346854848632, sum of packet lengths in the flow was 570.8, average packet length in the flow was 54.51954793142873, packet's length was 54.2, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.0 and the header length was 57.16, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83033384.6892584, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123831.26594141, minimum packet length in the flow was 50.1, maximum packet length in the flow was 52.0, magnitue was 10.035259567536588, sum of packet lengths in the flow was 527.0, average packet length in the flow was 50.35977396571437, packet's length was 50.1, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 26606.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83016552.0667047, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.2, magnitue was 10.01964104901864, sum of packet lengths in the flow was 528.2, average packet length in the flow was 50.197811591573206, packet's length was 50.4, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 22923.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83090173.31220002, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313934.30811346, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098693.20370135, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 19613.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102803.04683846, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 32236.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098920.08389083, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 28102.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83008172.4230327, minimum packet length in the flow was 125.2, maximum packet length in the flow was 132.85, magnitue was 15.690899913692746, sum of packet lengths in the flow was 1350.33, average packet length in the flow was 127.26798014313688, packet's length was 132.85, number of packets with RST flag set in the same flow was 0.07, number of packets with URG flag set in the same flow was 0.05 and the header length was 116.51, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83348230.58366576, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83698571.26863526, minimum packet length in the flow was 592.0, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6216.0, average packet length in the flow was 592.0, packet's length was 592.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82973116.29765375, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.1, number of packets with URG flag set in the same flow was 0.0 and the header length was 119.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123623.51754116, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 32855.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83784641.44011131, minimum packet length in the flow was 554.0, maximum packet length in the flow was 554.0, magnitue was 33.28663395418648, sum of packet lengths in the flow was 5817.0, average packet length in the flow was 554.0, packet's length was 554.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2788149.04, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102821.16190939, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 12789.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83482368.23487481, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128493.42861444, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102329.49904196, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.0, magnitue was 10.009933354950052, sum of packet lengths in the flow was 526.8, average packet length in the flow was 50.09930426556588, packet's length was 50.4, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 22320.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83094386.91452555, minimum packet length in the flow was 54.0, maximum packet length in the flow was 78.0, magnitue was 10.582026688941284, sum of packet lengths in the flow was 591.0, average packet length in the flow was 56.10305011809656, packet's length was 55.6, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 57.74, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83693758.04736313, minimum packet length in the flow was 485.6, maximum packet length in the flow was 586.68, magnitue was 33.747834714752855, sum of packet lengths in the flow was 6109.6, average packet length in the flow was 572.8600250239956, packet's length was 586.68, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83132074.07557124, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150646.23423815, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83106969.16146335, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 17275.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83101913.11408076, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 19161.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83011842.13600218, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.8, magnitue was 10.011534099932724, sum of packet lengths in the flow was 526.8, average packet length in the flow was 50.11557246245327, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 34848.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150115.15282388, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83344760.32257624, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83150313.49908824, minimum packet length in the flow was 42.0, maximum packet length in the flow was 58.92, magnitue was 9.276535240986505, sum of packet lengths in the flow was 457.92, average packet length in the flow was 43.08638114706071, packet's length was 43.88, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 2.3, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102398.76281399, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.6, magnitue was 10.009881095386213, sum of packet lengths in the flow was 526.6, average packet length in the flow was 50.09890579578661, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 25453.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82985272.10052823, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83094384.76829684, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314079.39403434, minimum packet length in the flow was 54.0, maximum packet length in the flow was 78.08, magnitue was 10.525469603686394, sum of packet lengths in the flow was 591.08, average packet length in the flow was 55.48853222658835, packet's length was 57.01, number of packets with RST flag set in the same flow was 1.01, number of packets with URG flag set in the same flow was 1.0 and the header length was 57.67, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098515.36076264, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 37825.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83076250.09715065, minimum packet length in the flow was 54.0, maximum packet length in the flow was 74.8, magnitue was 10.538874161177846, sum of packet lengths in the flow was 587.8, average packet length in the flow was 55.60781202285847, packet's length was 55.6, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 55.6, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82980957.95914464, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83016676.96014768, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 20075.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123891.6644693, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 23995.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83107439.82873067, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 15965.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83127968.45852095, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83330824.04151915, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 56.7, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83693760.12732549, minimum packet length in the flow was 592.0, maximum packet length in the flow was 592.0, magnitue was 34.409301068170514, sum of packet lengths in the flow was 6216.0, average packet length in the flow was 592.0, packet's length was 592.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83076968.51107275, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83067308.52644677, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128166.92245056, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83106681.12376437, minimum packet length in the flow was 50.0, maximum packet length in the flow was 53.0, magnitue was 10.026081017958704, sum of packet lengths in the flow was 528.0, average packet length in the flow was 50.26288126476207, packet's length was 50.2, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 13129.5, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83028579.2563145, minimum packet length in the flow was 50.4, maximum packet length in the flow was 57.6, magnitue was 10.375096451069902, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 5580.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83153725.00693552, minimum packet length in the flow was 42.0, maximum packet length in the flow was 56.2, magnitue was 9.269670319746275, sum of packet lengths in the flow was 455.2, average packet length in the flow was 43.02906606628665, packet's length was 43.66, number of packets with RST flag set in the same flow was 0.79, number of packets with URG flag set in the same flow was 0.32 and the header length was 280.4, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82972891.29629768, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.8, magnitue was 10.41411393816722, sum of packet lengths in the flow was 570.44, average packet length in the flow was 54.22689106593442, packet's length was 54.48, number of packets with RST flag set in the same flow was 0.25, number of packets with URG flag set in the same flow was 0.0 and the header length was 135.46, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83028457.69341849, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 43475.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83090044.6232148, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83124820.49898753, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83330947.78767857, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83127981.16741948, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83313932.15661448, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83106923.90936874, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 21311.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83093390.55152339, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83098369.9432908, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 20097.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83076979.05248843, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362038.15010285, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 166610288.05448037, minimum packet length in the flow was 50.0, maximum packet length in the flow was 3161.0, magnitue was 48.94761627765125, sum of packet lengths in the flow was 18330.1, average packet length in the flow was 1214.9722873909718, packet's length was 794.4, number of packets with RST flag set in the same flow was 2607.3, number of packets with URG flag set in the same flow was 1443.0 and the header length was 3026559.2, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123874.5988051, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 11525.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83072255.33713779, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.35, number of packets with URG flag set in the same flow was 0.14 and the header length was 128.9, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 0.0002631902694702, minimum packet length in the flow was 1222.0, maximum packet length in the flow was 3996.0, magnitue was 77.26237608981306, sum of packet lengths in the flow was 16649.0, average packet length in the flow was 2988.8317460317458, packet's length was 3120.0, number of packets with RST flag set in the same flow was 808.5, number of packets with URG flag set in the same flow was 75.0 and the header length was 2074295.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83016367.07052341, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 35375.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83097806.66655801, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.18, magnitue was 10.021289003788985, sum of packet lengths in the flow was 528.06, average packet length in the flow was 50.21414488177801, packet's length was 50.28, number of packets with RST flag set in the same flow was 0.01, number of packets with URG flag set in the same flow was 0.0 and the header length was 22708.08, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83677273.34380828, minimum packet length in the flow was 560.08, maximum packet length in the flow was 592.0, magnitue was 34.35464255938602, sum of packet lengths in the flow was 6184.08, average packet length in the flow was 590.1583366013072, packet's length was 586.68, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a non-DoS attack.
non-DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82950684.47042607, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83037134.1898303, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83331701.85091765, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83011843.64594345, minimum packet length in the flow was 50.0, maximum packet length in the flow was 51.64, magnitue was 10.013533464625926, sum of packet lengths in the flow was 527.56, average packet length in the flow was 50.13575300997592, packet's length was 50.84, number of packets with RST flag set in the same flow was 0.09, number of packets with URG flag set in the same flow was 0.02 and the header length was 35220.34, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314575.96072815, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 0.99 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83033392.92497392, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314073.78492068, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314385.56999926, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83314523.67026685, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 1.0, number of packets with URG flag set in the same flow was 1.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83093453.2170768, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123629.0019137, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 13205.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83076357.31819318, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83123860.45348953, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 8889.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82946391.34188204, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83102884.3959328, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 22003.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83149495.86348362, minimum packet length in the flow was 42.0, maximum packet length in the flow was 42.0, magnitue was 9.16515138991168, sum of packet lengths in the flow was 441.0, average packet length in the flow was 42.0, packet's length was 42.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 0.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83034063.10096455, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 54.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83106924.36926472, minimum packet length in the flow was 50.0, maximum packet length in the flow was 78.36, magnitue was 10.25942076872957, sum of packet lengths in the flow was 560.8, average packet length in the flow was 52.8397518049546, packet's length was 52.68, number of packets with RST flag set in the same flow was 0.05, number of packets with URG flag set in the same flow was 0.01 and the header length was 8836.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83012234.62861499, minimum packet length in the flow was 50.0, maximum packet length in the flow was 50.0, magnitue was 10.0, sum of packet lengths in the flow was 525.0, average packet length in the flow was 50.0, packet's length was 50.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 47375.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83362586.59114093, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 137.16, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83344760.38651286, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.24, magnitue was 10.39364595797032, sum of packet lengths in the flow was 567.24, average packet length in the flow was 54.01384709322325, packet's length was 54.04, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.0 and the header length was 55.2, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 82943432.144557, minimum packet length in the flow was 54.0, maximum packet length in the flow was 54.0, magnitue was 10.392304845413264, sum of packet lengths in the flow was 567.0, average packet length in the flow was 54.0, packet's length was 54.0, number of packets with RST flag set in the same flow was 0.0, number of packets with URG flag set in the same flow was 0.0 and the header length was 108.0, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83128170.40347517, minimum packet length in the flow was 42.0, maximum packet length in the flow was 45.12, magnitue was 9.191225624494855, sum of packet lengths in the flow was 444.12, average packet length in the flow was 42.24117180342877, packet's length was 42.24, number of packets with RST flag set in the same flow was 0.08, number of packets with URG flag set in the same flow was 0.04 and the header length was 41.84, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.
A network connection in which the time difference with the previous packet was 83349158.68644731, minimum packet length in the flow was 54.76, maximum packet length in the flow was 69.62, magnitue was 10.62958763725902, sum of packet lengths in the flow was 582.62, average packet length in the flow was 56.75933849354978, packet's length was 54.82, number of packets with RST flag set in the same flow was 0.02, number of packets with URG flag set in the same flow was 0.02 and the header length was 61.02, was a DoS attack.
DoS
Using the input data predict whether the intrusion is a DoS or a non-DoS attack.