I am going to make a dataset such as KDDCup99 for machine learning purposes, but I don't know how can i extract intrinsic and time-based attributes from wireshark analyzer!! KDDCup99 introduces 43 attributes (intrinsic, time-based and host-based attributes), and I am going to extract this attributes from wireshark analyzer. How can i do it? asked 02 Oct '12, 23:49 Bluebit edited 02 Oct '12, 23:51 |
2 Answers:
Jaap is mostly right. One option is to:
A second option, if you need KDDCup99 data fields collected in real-time is to:
The following should help in producing the CSV output from tshark CLI to 'logfile.csv':
Use Wireshark's packet header browser/details panel to choose which attributes you want to log, then add those attributes to the -e arguments list.
answered 18 Dec '12, 10:03 pds edited 12 Feb '13, 11:43 hey Friends ...me too working on kdd99cup data-set...my query is "how to trim (cut) data-set in 10% kdd99 cup...what are the factors we need to consider while trimming data"....kindly help me with algorithm or code to cut the data-set in to 10% of original...thanks (28 Feb '13, 19:32) sac |
Tshark and post process the text output? answered 03 Oct '12, 02:16 Jaap ♦ your comment is not clear for me! (03 Oct '12, 04:02) Bluebit |
You might like to consider https://www.itoc.usma.edu/research/dataset/ also. This is a more recent unlabelled IDS dataset with more sophisticated attacks than the (as I look at it now) outdated KDDCup99.