4 datasets found
  1. kddcup.data.gz

    • figshare.com
    application/gzip
    Updated Jun 23, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Moreau (2023). kddcup.data.gz [Dataset]. http://doi.org/10.6084/m9.figshare.23566914.v1
    Explore at:
    application/gzipAvailable download formats
    Dataset updated
    Jun 23, 2023
    Dataset provided by
    Figsharehttp://figshare.com/
    figshare
    Authors
    Moreau
    License

    https://www.gnu.org/licenses/gpl-3.0.htmlhttps://www.gnu.org/licenses/gpl-3.0.html

    Description

    Data for joblib example on compression, to make sure we can always serve it. Please don't use this data but refer to the original website: http://kdd.ics.uci.edu/databases/kddcup99/task.html

  2. kdd cyberattack

    • kaggle.com
    Updated Jul 28, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ziyad Mestour (2018). kdd cyberattack [Dataset]. https://www.kaggle.com/slashtea/kdd-cyberattack/code
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jul 28, 2018
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Ziyad Mestour
    License

    Open Database License (ODbL) v1.0https://www.opendatacommons.org/licenses/odbl/1.0/
    License information was derived automatically

    Description

    Context

    This is the data set used for The Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99 The Fifth International Conference on Knowledge Discovery and Data Mining. The competition task was to build a network intrusion detector, a predictive model capable of distinguishing between bad'' connections, called intrusions or attacks, andgood'' normal connections. This database contains a standard set of data to be audited, which includes a wide variety of intrusions simulated in a military network environment.

    Content

    For more information about the contents refer to this link http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

    Acknowledgements

    The dataset is shared on Kaggle on behalf of KDD's work.

    Inspiration

    Build a classifier capable of distinguishing between attacks, and normal connections

  3. d

    Replication Data for: Scalable Kernel Mean Matching

    • search.dataone.org
    • dataverse.harvard.edu
    Updated Nov 21, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Chandra, Swarup (2023). Replication Data for: Scalable Kernel Mean Matching [Dataset]. http://doi.org/10.7910/DVN/ELFPEM
    Explore at:
    Dataset updated
    Nov 21, 2023
    Dataset provided by
    Harvard Dataverse
    Authors
    Chandra, Swarup
    Description
  4. i

    Data from: KDD Cup 1999 Data

    • impactcybertrust.org
    Updated Jan 19, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    External Data Source (2019). KDD Cup 1999 Data [Dataset]. http://doi.org/10.23721/100/1478801
    Explore at:
    Dataset updated
    Jan 19, 2019
    Authors
    External Data Source
    Description

    This is the data set used for intrusion detector learning task in the Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99, The Fifth International Conference on Knowledge Discovery and Data Mining. The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between bad'' connections, called intrusions or attacks, andgood'' normal connections.

    The 1998 DARPA Intrusion Detection Evaluation Program was prepared and managed by MIT Lincoln Labs. The objective was to survey and evaluate research in intrusion detection. A standard set of data to be audited, which includes a wide variety of intrusions simulated in a military network environment, was provided. The 1999 KDD intrusion detection contest uses a version of this dataset.

    Lincoln Labs set up an environment to acquire nine weeks of raw TCP dump data for a local-area network (LAN) simulating a typical U.S. Air Force LAN. They operated the LAN as if it were a true Air Force environment, but peppered it with multiple attacks.

    The raw training data was about four gigabytes of compressed binary TCP dump data from seven weeks of network traffic. This was processed into about five million connection records. Similarly, the two weeks of test data yielded around two million connection records. ; gcounsel@ics.uci.edu

  5. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Moreau (2023). kddcup.data.gz [Dataset]. http://doi.org/10.6084/m9.figshare.23566914.v1
Organization logoOrganization logo

kddcup.data.gz

Explore at:
37 scholarly articles cite this dataset (View in Google Scholar)
application/gzipAvailable download formats
Dataset updated
Jun 23, 2023
Dataset provided by
Figsharehttp://figshare.com/
figshare
Authors
Moreau
License

https://www.gnu.org/licenses/gpl-3.0.htmlhttps://www.gnu.org/licenses/gpl-3.0.html

Description

Data for joblib example on compression, to make sure we can always serve it. Please don't use this data but refer to the original website: http://kdd.ics.uci.edu/databases/kddcup99/task.html

Search
Clear search
Close search
Google apps
Main menu