|
--- |
|
license: apache-2.0 |
|
datasets: |
|
- rdpahalavan/network-packet-flow-header-payload |
|
widget: |
|
- text: >- |
|
14 89 125161 -1 80 46060 1500 1460 253 0 5 0 -1 29 39 25 28 17 20 40 45 39 |
|
56 50 41 59 42 42 58 47 37 55 40 30 51 51 37 55 47 40 57 45 32 62 32 30 50 |
|
31 26 50 71 68 103 86 93 132 43 52 89 42 34 48 40 34 45 42 32 51 42 31 40 64 |
|
38 32 182 151 122 72 65 74 66 48 63 50 40 59 52 42 61 61 46 60 68 42 60 63 |
|
49 63 56 53 63 71 78 92 60 54 66 60 59 68 60 52 63 62 60 65 58 65 75 45 39 |
|
66 38 31 44 40 31 45 41 28 47 43 32 54 45 33 55 42 28 48 39 32 40 31 31 44 |
|
39 31 55 54 45 63 60 51 55 57 47 62 125 112 96 154 139 111 113 104 89 133 |
|
126 100 161 144 123 157 135 117 87 68 69 103 81 71 183 163 128 177 159 128 |
|
113 108 94 59 41 58 81 59 66 95 73 65 149 142 115 152 135 115 159 139 116 |
|
168 157 127 101 84 81 56 35 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 |
|
-1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 |
|
tags: |
|
- Network Intrusion Detection |
|
- Cybersecurity |
|
- Network Packets |
|
--- |
|
|
|
This model was fine-tuned for classifying a network packet into one of the below categories. For details about the dataset used, [visit here](https://huggingface.co/datasets/rdpahalavan/network-packet-flow-header-payload). |
|
|
|
```python |
|
['Analysis', |
|
'Backdoor', |
|
'Bot', |
|
'DDoS', |
|
'DoS', |
|
'DoS GoldenEye', |
|
'DoS Hulk', |
|
'DoS SlowHTTPTest', |
|
'DoS Slowloris', |
|
'Exploits', |
|
'FTP Patator', |
|
'Fuzzers', |
|
'Generic', |
|
'Heartbleed', |
|
'Infiltration', |
|
'Normal', |
|
'Port Scan', |
|
'Reconnaissance', |
|
'SSH Patator', |
|
'Shellcode', |
|
'Web Attack - Brute Force', |
|
'Web Attack - SQL Injection', |
|
'Web Attack - XSS', |
|
'Worms'] |
|
``` |
|
|