Table 2 Comparison of various cybersecurity datasets.
Dataset | Samples | Features | Attack types | Real/synthetic |
|---|---|---|---|---|
NSL-KDD | 125,973 | 41 | 4 | Synthetic |
CICIDS2017 | 3,119,345 | 85 | 15 | Real |
UNSW-NB15 | 2,540,044 | 49 | 9 | Mixed |
CTU-13 | 12,392,796 | 16 | Botnet-focused | Real |
Dataset | Samples | Features | Attack types | Real/synthetic |
|---|---|---|---|---|
NSL-KDD | 125,973 | 41 | 4 | Synthetic |
CICIDS2017 | 3,119,345 | 85 | 15 | Real |
UNSW-NB15 | 2,540,044 | 49 | 9 | Mixed |
CTU-13 | 12,392,796 | 16 | Botnet-focused | Real |