Research Article
[Retracted] Research on Boruta-ET-Based Anomalous Traffic Detection Model
Table 1
CICIDS2017 dataset file description.
| Name of files | Attacks | Day activity |
| Monday-WorkingHours.pcap_ISCX.csv | Benign (normal human activities) | Monday | Tuesday-WorkingHours.pcap_ISCX.csv | Benign, FTP-patator, SSH-patator | Tuesday | Wednesday-WorkingHours.pcap_ISCX.csv | Benign, DoS GoldenEye, DoS hulk, DoS slowhttptest, DoS slowloris, Heartbleed | Wednesday | Thursday-WorkingHours-Morning-WebAttacks.pcap_ ISCX.csv | Benign, web attack—brute force, web attack—Sql injection, web attack—XSS | Thursday | Thursday-WorkingHours-afternoon-infilteration.pcap_ ISCX.csv | Benign, infiltration | Thursday | Friday-WorkingHours-morning.pcap_ISCX.csv | Benign, bot | Friday | Friday-WorkingHours-Afternoon-PortScan.pcap_ISCX.csv | Benign, port scan | Friday | Friday-WorkingHours-afternoon-DDos.pcap_ISCX.csv | Benign, DDoS | Friday |
|
|