Download: dhcp Zip File
Number of Instances: | 4780 | Security Area: | Network Protocols |
---|---|---|---|
Number of Attributes: | 10 | Date Donated: | 2012 |
Missing Values? | - | Associated ML Tasks: | Network Analysis |
Mike Sconzo
Security Repository
Secrepo.com
Analyzes DHCP traffic in order to log DHCP leases given to clients. This script ignores large swaths of the protocol, since it is rather noisy on most networks, and focuses on the end-result: assigned leases.
Data Type | Count | Unique Values | Missing Values | |
---|---|---|---|---|
ts | float64 | 4780 | 4780 | 0 |
uid | object | 4780 | 2393 | 0 |
id.orig_h | object | 4780 | 128 | 0 |
id.orig_p | int64 | 4780 | 1 | 0 |
id.resp_h | object | 4780 | 128 | 0 |
id.resp_p | int64 | 4780 | 1 | 0 |
mac | object | 4780 | 128 | 0 |
assigned_ip | object | 4780 | 128 | 0 |
lease_time | float64 | 4780 | 1 | 0 |
trans_id | int64 | 4780 | 4780 | 0 |
Bro Logs http://gauss.ececs.uc.edu/Courses/c6055/pdf/bro_log_vars.pdf
Neise, Patrick. "Intrusion Detection Through Relationship Analysis". Oct 2016 https://www.sans.org/reading-room/whitepapers/detection/intrusion-detection-relationship-analysis-37352
Frances Bernadette C. De Ocampo, Trisha Mari L. Del Castillo, Miguel Alberto N. Gomez. "AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES". 2013 http://sdiwc.net/digital-library/automated-signature-creator-for-a-signature-based-intrusion-detection-system-with-network-attack-detection-capabilities-pancakes.html