Table 2.
Distribution of different attack behaviors in the UNSW-NB15 data set.
| Data set | Attack behavior | Total | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Normal | Fuzzers | Analysis | Backdoors | DoS | Exploits | Generic | Recon. | Shellcode | Worms | ||
| Train | 56,000 | 18,174 | 2,000 | 1,746 | 12,264 | 33,393 | 40,000 | 10,491 | 1,133 | 130 | 175,341 |
| Test | 37,000 | 6,062 | 677 | 583 | 4,089 | 11,132 | 18,871 | 3,496 | 378 | 44 | 82,332 |
| Total | 93,000 | 24,246 | 2,677 | 2,329 | 16,353 | 44,525 | 58,871 | 13,987 | 1,511 | 174 | 257,673 |