Opendatabay APP

Network Security Classification Data

Data Science and Analytics

Tags and Keywords

Firewall

Network

Security

Logs

Traffic

Trusted By
Trusted by company1Trusted by company2Trusted by company3
Network Security Classification Data Dataset on Opendatabay data marketplace

"No reviews yet"

Free

About

Presents detailed log file data capturing internet traffic activity managed by a network firewall. This raw data set is derived from a security environment and features 12 metrics describing connection flows. The primary goal of the data is to facilitate the classification of firewall actions, which include decisions such as 'allow', 'drop', or 'reset-both', making it invaluable for training network intrusion detection and security policy analysis models. The source material was developed for research focused on classifying firewall log files using multiclass support vector machines.

Columns

  • Source Port: The network port used by the initiating host.
  • Destination Port: The network port targeted by the connection attempt.
  • NAT Source Port: The source port after Network Address Translation has been applied.
  • NAT Destination Port: The destination port after Network Address Translation has been applied.
  • Action: The resulting firewall class decision, serving as the label attribute. The four distinct actions captured are 'allow', 'action', 'drop', and 'reset-both'.
  • Bytes: The total volume of data transferred during the recorded connection.
  • Bytes Sent: The volume of data transmitted from the source.
  • Bytes Received: The volume of data received by the destination.
  • Packets: The overall count of network packets involved in the connection.
  • Elapsed Time (sec): The duration of the recorded connection flow in seconds.
  • pkts_sent: The number of packets sent by the source host.
  • pkts_received: The number of packets received by the destination host.

Distribution

The data is provided in a CSV file format, specifically named log2.csv, with a size of approximately 2.88 MB. It consists of 12 distinct columns and contains 65.5 thousand valid records. Across all critical attributes, 100% of the data is reported as valid, with zero missing or mismatched entries noted, ensuring high data quality for processing. The expected update frequency for this log data is never.

Usage

This resource is ideally suited for developing and testing algorithms related to network security and traffic management. Specific uses include:
  1. Training and benchmarking machine learning models for multiclass classification of firewall actions.
  2. Research into optimising network flow analysis and firewall policies.
  3. Developing tools for security incident response and intrusion detection systems.
  4. Statistical analysis of network behaviour patterns.

Coverage

The data covers flow metrics and statistics recorded by an internet firewall, focusing exclusively on network characteristics (ports, bytes, packets, and duration). It does not contain geographic, time range, or demographic scope information. The underlying source research originated from Fatih Ertam at Firat University, Turkey.

License

CC0: Public Domain

Who Can Use It

  • Academics and Researchers: For use in computer science and engineering studies concerning data classification, network log analysis, and the application of machine learning in cybersecurity.
  • Data Scientists: To apply supervised learning techniques, such as Support Vector Machines, to categorise security events accurately.
  • Network Engineers/Security Professionals: To simulate network environments and test the effectiveness of existing or proposed security protocols.

Dataset Name Suggestions

  • Firewall Traffic Action Logs
  • Network Security Classification Data
  • Internet Log Flow Metrics
  • Firewall Packet Metrics

Attributes

Listing Stats

VIEWS

1

DOWNLOADS

0

LISTED

20/10/2025

REGION

GLOBAL

Universal Data Quality Score Logo UDQSQUALITY

5 / 5

VERSION

1.0

Loading...

Free

Download Dataset in CSV Format