Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Dataset | Attack type | Traces amount | Label |
| Training | Training | 833 | Normal | Validation | Validation | 4373 | Normal | Attack | Hydra-FTP | 162 | Attack | Attack | Hydra-SSH | 148 | Attack | Attack | Adduser | 91 | Attack | Attack | Java-meterpreter | 125 | Attack | Attack | Meterpreter | 75 | Attack | Attack | Web shell | 118 | Attack |
|
|