File size: 1,615 Bytes
fba94c4
 
012dfea
a8f1d40
012dfea
a775768
 
 
 
 
 
 
 
 
 
 
 
b72c3a6
fc6e162
 
 
9c6a726
 
5ab34cc
0ca5bb1
18d047e
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
0ca5bb1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
---
license: apache-2.0
datasets:
- rdpahalavan/network-packet-flow-header-payload
widget:
- text: >-
    14 89 125161 -1 80 46060 1500 1460 253 0 5 0 -1 29 39 25 28 17 20 40 45 39
    56 50 41 59 42 42 58 47 37 55 40 30 51 51 37 55 47 40 57 45 32 62 32 30 50
    31 26 50 71 68 103 86 93 132 43 52 89 42 34 48 40 34 45 42 32 51 42 31 40 64
    38 32 182 151 122 72 65 74 66 48 63 50 40 59 52 42 61 61 46 60 68 42 60 63
    49 63 56 53 63 71 78 92 60 54 66 60 59 68 60 52 63 62 60 65 58 65 75 45 39
    66 38 31 44 40 31 45 41 28 47 43 32 54 45 33 55 42 28 48 39 32 40 31 31 44
    39 31 55 54 45 63 60 51 55 57 47 62 125 112 96 154 139 111 113 104 89 133
    126 100 161 144 123 157 135 117 87 68 69 103 81 71 183 163 128 177 159 128
    113 108 94 59 41 58 81 59 66 95 73 65 149 142 115 152 135 115 159 139 116
    168 157 127 101 84 81 56 35 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1
    -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1
tags:
- Network Intrusion Detection
- Cybersecurity
- Network Packets
---

This model was fine-tuned for classifying a network packet into one of the below categories. For details about the dataset used, [visit here](https://huggingface.co/datasets/rdpahalavan/network-packet-flow-header-payload).

```python
['Analysis',
 'Backdoor',
 'Bot',
 'DDoS',
 'DoS',
 'DoS GoldenEye',
 'DoS Hulk',
 'DoS SlowHTTPTest',
 'DoS Slowloris',
 'Exploits',
 'FTP Patator',
 'Fuzzers',
 'Generic',
 'Heartbleed',
 'Infiltration',
 'Normal',
 'Port Scan',
 'Reconnaissance',
 'SSH Patator',
 'Shellcode',
 'Web Attack - Brute Force',
 'Web Attack - SQL Injection',
 'Web Attack - XSS',
 'Worms']
```