{"id":205,"date":"2025-07-16T21:43:30","date_gmt":"2025-07-16T20:43:30","guid":{"rendered":"https:\/\/mamdouh.de\/?p=205"},"modified":"2025-07-16T21:58:22","modified_gmt":"2025-07-16T20:58:22","slug":"cybersecurity-datasets","status":"publish","type":"post","link":"https:\/\/mamdouh.de\/index.php\/2025\/07\/16\/cybersecurity-datasets\/","title":{"rendered":"Cybersecurity Datasets"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">KDD99:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">UNSW-NB15 Dataset:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">CICIDS2017:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">CSEIDS2018:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">CICDDoS2019:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Edge-IIoT:<\/h2>\n\n\n\n<p>&amp; Data Type, Size &amp; Volume, Attack Taxonomy &amp; Coverage, Feature Set &amp; Representation, Class Distribution &amp; Imbalance, Data Collection Method \/ Source \/ Operational Context, Temporal Splits &amp; Benchmarking Support, Relevance &amp; Currency<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Granularity<\/li>\n\n\n\n<li>Size (samples\/flows\/records)<\/li>\n\n\n\n<li>Feature Set<\/li>\n\n\n\n<li>Volume (Time Span)<\/li>\n\n\n\n<li>Attack Taxonomy &amp; Coverage<\/li>\n\n\n\n<li>Represenation<\/li>\n\n\n\n<li>Class Distribution<\/li>\n\n\n\n<li>License<\/li>\n\n\n\n<li>Data Collection Method<\/li>\n\n\n\n<li>Temporal Splits &amp; Benchmarking Support<\/li>\n\n\n\n<li>Relevance &amp; Currency<\/li>\n\n\n\n<li>Labeled<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>KDD99: UNSW-NB15 Dataset: CICIDS2017: CSEIDS2018: CICDDoS2019: Edge-IIoT: &amp; Data Type, Size &amp; Volume, Attack Taxonomy &amp; Coverage, Feature Set &amp; Representation, Class Distribution &amp; Imbalance, Data&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-205","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":2,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":208,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/205\/revisions\/208"}],"wp:attachment":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}