Research Article

[Retracted] Research on Boruta-ET-Based Anomalous Traffic Detection Model

Table 1

CICIDS2017 dataset file description.

Name of filesAttacksDay activity

Monday-WorkingHours.pcap_ISCX.csvBenign (normal human activities)Monday
Tuesday-WorkingHours.pcap_ISCX.csvBenign, FTP-patator, SSH-patatorTuesday
Wednesday-WorkingHours.pcap_ISCX.csvBenign, DoS GoldenEye, DoS hulk, DoS slowhttptest, DoS slowloris, HeartbleedWednesday
Thursday-WorkingHours-Morning-WebAttacks.pcap_ ISCX.csvBenign, web attack—brute force, web attack—Sql injection, web attack—XSSThursday
Thursday-WorkingHours-afternoon-infilteration.pcap_ ISCX.csvBenign, infiltrationThursday
Friday-WorkingHours-morning.pcap_ISCX.csvBenign, botFriday
Friday-WorkingHours-Afternoon-PortScan.pcap_ISCX.csvBenign, port scanFriday
Friday-WorkingHours-afternoon-DDos.pcap_ISCX.csvBenign, DDoSFriday