Changes
On December 16, 2024 at 7:10:06 PM UTC, admin:
-
Changed value of field
doi_status
toTrue
in CICIDS2017 -
Changed value of field
doi_date_published
to2024-12-16
in CICIDS2017 -
Added resource Original Metadata to CICIDS2017
f | 1 | { | f | 1 | { |
2 | "access_rights": "", | 2 | "access_rights": "", | ||
3 | "author": "Simon Msika", | 3 | "author": "Simon Msika", | ||
4 | "author_email": "", | 4 | "author_email": "", | ||
5 | "citation": [ | 5 | "citation": [ | ||
6 | "https://doi.org/10.1109/GLOBECOM46510.2021.9685338", | 6 | "https://doi.org/10.1109/GLOBECOM46510.2021.9685338", | ||
7 | "https://doi.org/10.1007/978-3-031-17551-0_25", | 7 | "https://doi.org/10.1007/978-3-031-17551-0_25", | ||
8 | "https://doi.org/10.48550/arXiv.1912.09303", | 8 | "https://doi.org/10.48550/arXiv.1912.09303", | ||
9 | "https://doi.org/10.48550/arXiv.1905.03454", | 9 | "https://doi.org/10.48550/arXiv.1905.03454", | ||
10 | "https://doi.org/10.48550/arXiv.1907.11129" | 10 | "https://doi.org/10.48550/arXiv.1907.11129" | ||
11 | ], | 11 | ], | ||
12 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 12 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
13 | "defined_in": "https://doi.org/10.3390/s21051761", | 13 | "defined_in": "https://doi.org/10.3390/s21051761", | ||
14 | "doi": "10.57702/5l82ahlb", | 14 | "doi": "10.57702/5l82ahlb", | ||
n | 15 | "doi_date_published": null, | n | 15 | "doi_date_published": "2024-12-16", |
16 | "doi_publisher": "TIB", | 16 | "doi_publisher": "TIB", | ||
n | 17 | "doi_status": false, | n | 17 | "doi_status": true, |
18 | "domain": "https://service.tib.eu/ldmservice", | 18 | "domain": "https://service.tib.eu/ldmservice", | ||
19 | "extra_authors": [ | 19 | "extra_authors": [ | ||
20 | { | 20 | { | ||
21 | "extra_author": "Alejandro Quintero", | 21 | "extra_author": "Alejandro Quintero", | ||
22 | "orcid": "" | 22 | "orcid": "" | ||
23 | }, | 23 | }, | ||
24 | { | 24 | { | ||
25 | "extra_author": "Foutse Khomh", | 25 | "extra_author": "Foutse Khomh", | ||
26 | "orcid": "" | 26 | "orcid": "" | ||
27 | } | 27 | } | ||
28 | ], | 28 | ], | ||
29 | "groups": [ | 29 | "groups": [ | ||
30 | { | 30 | { | ||
31 | "description": "", | 31 | "description": "", | ||
32 | "display_name": "Cybersecurity", | 32 | "display_name": "Cybersecurity", | ||
33 | "id": "a0b2c373-a789-40c6-918e-57297ef3f6bf", | 33 | "id": "a0b2c373-a789-40c6-918e-57297ef3f6bf", | ||
34 | "image_display_url": "", | 34 | "image_display_url": "", | ||
35 | "name": "cybersecurity", | 35 | "name": "cybersecurity", | ||
36 | "title": "Cybersecurity" | 36 | "title": "Cybersecurity" | ||
37 | }, | 37 | }, | ||
38 | { | 38 | { | ||
39 | "description": "", | 39 | "description": "", | ||
40 | "display_name": "Intrusion Detection", | 40 | "display_name": "Intrusion Detection", | ||
41 | "id": "026b3a06-790e-48a4-8d08-5f2567959844", | 41 | "id": "026b3a06-790e-48a4-8d08-5f2567959844", | ||
42 | "image_display_url": "", | 42 | "image_display_url": "", | ||
43 | "name": "intrusion-detection", | 43 | "name": "intrusion-detection", | ||
44 | "title": "Intrusion Detection" | 44 | "title": "Intrusion Detection" | ||
45 | }, | 45 | }, | ||
46 | { | 46 | { | ||
47 | "description": "", | 47 | "description": "", | ||
48 | "display_name": "Network Intrusion Detection", | 48 | "display_name": "Network Intrusion Detection", | ||
49 | "id": "439fe9a9-e765-484a-9bf0-272426d6409a", | 49 | "id": "439fe9a9-e765-484a-9bf0-272426d6409a", | ||
50 | "image_display_url": "", | 50 | "image_display_url": "", | ||
51 | "name": "network-intrusion-detection", | 51 | "name": "network-intrusion-detection", | ||
52 | "title": "Network Intrusion Detection" | 52 | "title": "Network Intrusion Detection" | ||
53 | }, | 53 | }, | ||
54 | { | 54 | { | ||
55 | "description": "", | 55 | "description": "", | ||
56 | "display_name": "Network Security", | 56 | "display_name": "Network Security", | ||
57 | "id": "9d0bc270-cedf-482b-850e-85b2ddca35aa", | 57 | "id": "9d0bc270-cedf-482b-850e-85b2ddca35aa", | ||
58 | "image_display_url": "", | 58 | "image_display_url": "", | ||
59 | "name": "network-security", | 59 | "name": "network-security", | ||
60 | "title": "Network Security" | 60 | "title": "Network Security" | ||
61 | } | 61 | } | ||
62 | ], | 62 | ], | ||
63 | "id": "02972493-f458-45da-b03a-1842dc65b230", | 63 | "id": "02972493-f458-45da-b03a-1842dc65b230", | ||
64 | "isopen": false, | 64 | "isopen": false, | ||
65 | "landing_page": "https://github.com/ndschlesser/CICDS-2017", | 65 | "landing_page": "https://github.com/ndschlesser/CICDS-2017", | ||
66 | "license_title": null, | 66 | "license_title": null, | ||
67 | "link_orkg": "", | 67 | "link_orkg": "", | ||
68 | "metadata_created": "2024-12-16T19:10:04.822985", | 68 | "metadata_created": "2024-12-16T19:10:04.822985", | ||
n | 69 | "metadata_modified": "2024-12-16T19:10:04.822991", | n | 69 | "metadata_modified": "2024-12-16T19:10:05.224293", |
70 | "name": "cicids2017", | 70 | "name": "cicids2017", | ||
71 | "notes": "The CICIDS2017 dataset was collected 2 years after the | 71 | "notes": "The CICIDS2017 dataset was collected 2 years after the | ||
72 | UNSW NB-15 data. The collection took place for a week. On each day | 72 | UNSW NB-15 data. The collection took place for a week. On each day | ||
73 | attacks such as: Brute Force FTP, Brute Force SSH, DoS, Heartbleed, | 73 | attacks such as: Brute Force FTP, Brute Force SSH, DoS, Heartbleed, | ||
74 | Web Attack, Infiltration, Botnet and DDoS were conducted.", | 74 | Web Attack, Infiltration, Botnet and DDoS were conducted.", | ||
n | 75 | "num_resources": 0, | n | 75 | "num_resources": 1, |
76 | "num_tags": 16, | 76 | "num_tags": 16, | ||
77 | "organization": { | 77 | "organization": { | ||
78 | "approval_status": "approved", | 78 | "approval_status": "approved", | ||
79 | "created": "2024-11-25T12:11:38.292601", | 79 | "created": "2024-11-25T12:11:38.292601", | ||
80 | "description": "", | 80 | "description": "", | ||
81 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 81 | "id": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
82 | "image_url": "", | 82 | "image_url": "", | ||
83 | "is_organization": true, | 83 | "is_organization": true, | ||
84 | "name": "no-organization", | 84 | "name": "no-organization", | ||
85 | "state": "active", | 85 | "state": "active", | ||
86 | "title": "No Organization", | 86 | "title": "No Organization", | ||
87 | "type": "organization" | 87 | "type": "organization" | ||
88 | }, | 88 | }, | ||
89 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | 89 | "owner_org": "079d46db-32df-4b48-91f3-0a8bc8f69559", | ||
90 | "private": false, | 90 | "private": false, | ||
91 | "relationships_as_object": [], | 91 | "relationships_as_object": [], | ||
92 | "relationships_as_subject": [], | 92 | "relationships_as_subject": [], | ||
t | 93 | "resources": [], | t | 93 | "resources": [ |
94 | { | ||||
95 | "cache_last_updated": null, | ||||
96 | "cache_url": null, | ||||
97 | "created": "2024-12-16T18:25:39", | ||||
98 | "data": [ | ||||
99 | "dcterms:title", | ||||
100 | "dcterms:accessRights", | ||||
101 | "dcterms:creator", | ||||
102 | "dcterms:description", | ||||
103 | "dcterms:issued", | ||||
104 | "dcterms:language", | ||||
105 | "dcterms:identifier", | ||||
106 | "dcat:theme", | ||||
107 | "dcterms:type", | ||||
108 | "dcat:keyword", | ||||
109 | "dcat:landingPage", | ||||
110 | "dcterms:hasVersion", | ||||
111 | "dcterms:format", | ||||
112 | "mls:task", | ||||
113 | "datacite:isDescribedBy" | ||||
114 | ], | ||||
115 | "description": "The json representation of the dataset with its | ||||
116 | distributions based on DCAT.", | ||||
117 | "format": "JSON", | ||||
118 | "hash": "", | ||||
119 | "id": "3dd7518a-d42d-4ade-9206-be4ab304aa08", | ||||
120 | "last_modified": "2024-12-16T19:10:05.214075", | ||||
121 | "metadata_modified": "2024-12-16T19:10:05.227809", | ||||
122 | "mimetype": "application/json", | ||||
123 | "mimetype_inner": null, | ||||
124 | "name": "Original Metadata", | ||||
125 | "package_id": "02972493-f458-45da-b03a-1842dc65b230", | ||||
126 | "position": 0, | ||||
127 | "resource_type": null, | ||||
128 | "size": 1452, | ||||
129 | "state": "active", | ||||
130 | "url": | ||||
131 | resource/3dd7518a-d42d-4ade-9206-be4ab304aa08/download/metadata.json", | ||||
132 | "url_type": "upload" | ||||
133 | } | ||||
134 | ], | ||||
94 | "services_used_list": "", | 135 | "services_used_list": "", | ||
95 | "state": "active", | 136 | "state": "active", | ||
96 | "tags": [ | 137 | "tags": [ | ||
97 | { | 138 | { | ||
98 | "display_name": "Anomaly Detection", | 139 | "display_name": "Anomaly Detection", | ||
99 | "id": "772b074e-4795-4f11-80b4-362b2f8a0dca", | 140 | "id": "772b074e-4795-4f11-80b4-362b2f8a0dca", | ||
100 | "name": "Anomaly Detection", | 141 | "name": "Anomaly Detection", | ||
101 | "state": "active", | 142 | "state": "active", | ||
102 | "vocabulary_id": null | 143 | "vocabulary_id": null | ||
103 | }, | 144 | }, | ||
104 | { | 145 | { | ||
105 | "display_name": "Attack Detection", | 146 | "display_name": "Attack Detection", | ||
106 | "id": "b8ea91d5-83f8-40f9-b81b-faef95267a8f", | 147 | "id": "b8ea91d5-83f8-40f9-b81b-faef95267a8f", | ||
107 | "name": "Attack Detection", | 148 | "name": "Attack Detection", | ||
108 | "state": "active", | 149 | "state": "active", | ||
109 | "vocabulary_id": null | 150 | "vocabulary_id": null | ||
110 | }, | 151 | }, | ||
111 | { | 152 | { | ||
112 | "display_name": "CICIDS2017", | 153 | "display_name": "CICIDS2017", | ||
113 | "id": "b3d99634-59ce-4190-8946-10b317edc0e5", | 154 | "id": "b3d99634-59ce-4190-8946-10b317edc0e5", | ||
114 | "name": "CICIDS2017", | 155 | "name": "CICIDS2017", | ||
115 | "state": "active", | 156 | "state": "active", | ||
116 | "vocabulary_id": null | 157 | "vocabulary_id": null | ||
117 | }, | 158 | }, | ||
118 | { | 159 | { | ||
119 | "display_name": "Cyber-Security", | 160 | "display_name": "Cyber-Security", | ||
120 | "id": "62032702-ae2e-4fa7-b596-f35975151c1b", | 161 | "id": "62032702-ae2e-4fa7-b596-f35975151c1b", | ||
121 | "name": "Cyber-Security", | 162 | "name": "Cyber-Security", | ||
122 | "state": "active", | 163 | "state": "active", | ||
123 | "vocabulary_id": null | 164 | "vocabulary_id": null | ||
124 | }, | 165 | }, | ||
125 | { | 166 | { | ||
126 | "display_name": "Cyber-attacks", | 167 | "display_name": "Cyber-attacks", | ||
127 | "id": "bffe84f2-23ef-4561-85ac-4d95ebb4ca65", | 168 | "id": "bffe84f2-23ef-4561-85ac-4d95ebb4ca65", | ||
128 | "name": "Cyber-attacks", | 169 | "name": "Cyber-attacks", | ||
129 | "state": "active", | 170 | "state": "active", | ||
130 | "vocabulary_id": null | 171 | "vocabulary_id": null | ||
131 | }, | 172 | }, | ||
132 | { | 173 | { | ||
133 | "display_name": "Cybersecurity", | 174 | "display_name": "Cybersecurity", | ||
134 | "id": "4b21340c-8906-48e4-bfb3-897c7dd2924d", | 175 | "id": "4b21340c-8906-48e4-bfb3-897c7dd2924d", | ||
135 | "name": "Cybersecurity", | 176 | "name": "Cybersecurity", | ||
136 | "state": "active", | 177 | "state": "active", | ||
137 | "vocabulary_id": null | 178 | "vocabulary_id": null | ||
138 | }, | 179 | }, | ||
139 | { | 180 | { | ||
140 | "display_name": "Dataset", | 181 | "display_name": "Dataset", | ||
141 | "id": "81587eb2-9569-4a4b-83c8-0e2ac78e7e3b", | 182 | "id": "81587eb2-9569-4a4b-83c8-0e2ac78e7e3b", | ||
142 | "name": "Dataset", | 183 | "name": "Dataset", | ||
143 | "state": "active", | 184 | "state": "active", | ||
144 | "vocabulary_id": null | 185 | "vocabulary_id": null | ||
145 | }, | 186 | }, | ||
146 | { | 187 | { | ||
147 | "display_name": "Deep learning", | 188 | "display_name": "Deep learning", | ||
148 | "id": "a8638dc7-b339-4a0b-8daa-ef73a49e2688", | 189 | "id": "a8638dc7-b339-4a0b-8daa-ef73a49e2688", | ||
149 | "name": "Deep learning", | 190 | "name": "Deep learning", | ||
150 | "state": "active", | 191 | "state": "active", | ||
151 | "vocabulary_id": null | 192 | "vocabulary_id": null | ||
152 | }, | 193 | }, | ||
153 | { | 194 | { | ||
154 | "display_name": "Intrusion Detection", | 195 | "display_name": "Intrusion Detection", | ||
155 | "id": "6691b029-0222-4c50-a15b-ef13d115bc85", | 196 | "id": "6691b029-0222-4c50-a15b-ef13d115bc85", | ||
156 | "name": "Intrusion Detection", | 197 | "name": "Intrusion Detection", | ||
157 | "state": "active", | 198 | "state": "active", | ||
158 | "vocabulary_id": null | 199 | "vocabulary_id": null | ||
159 | }, | 200 | }, | ||
160 | { | 201 | { | ||
161 | "display_name": "Intrusion detection", | 202 | "display_name": "Intrusion detection", | ||
162 | "id": "85658ba0-0310-41bd-8c31-5a5a0b313367", | 203 | "id": "85658ba0-0310-41bd-8c31-5a5a0b313367", | ||
163 | "name": "Intrusion detection", | 204 | "name": "Intrusion detection", | ||
164 | "state": "active", | 205 | "state": "active", | ||
165 | "vocabulary_id": null | 206 | "vocabulary_id": null | ||
166 | }, | 207 | }, | ||
167 | { | 208 | { | ||
168 | "display_name": "IoT", | 209 | "display_name": "IoT", | ||
169 | "id": "9f8a8143-5253-4cb2-83fd-eb89f5d546b8", | 210 | "id": "9f8a8143-5253-4cb2-83fd-eb89f5d546b8", | ||
170 | "name": "IoT", | 211 | "name": "IoT", | ||
171 | "state": "active", | 212 | "state": "active", | ||
172 | "vocabulary_id": null | 213 | "vocabulary_id": null | ||
173 | }, | 214 | }, | ||
174 | { | 215 | { | ||
175 | "display_name": "Network Traffic", | 216 | "display_name": "Network Traffic", | ||
176 | "id": "ca70d612-78d3-4060-bda4-4202bb415b5e", | 217 | "id": "ca70d612-78d3-4060-bda4-4202bb415b5e", | ||
177 | "name": "Network Traffic", | 218 | "name": "Network Traffic", | ||
178 | "state": "active", | 219 | "state": "active", | ||
179 | "vocabulary_id": null | 220 | "vocabulary_id": null | ||
180 | }, | 221 | }, | ||
181 | { | 222 | { | ||
182 | "display_name": "Network traffic", | 223 | "display_name": "Network traffic", | ||
183 | "id": "30073ff8-5c8a-41e0-be69-7f8cda33a332", | 224 | "id": "30073ff8-5c8a-41e0-be69-7f8cda33a332", | ||
184 | "name": "Network traffic", | 225 | "name": "Network traffic", | ||
185 | "state": "active", | 226 | "state": "active", | ||
186 | "vocabulary_id": null | 227 | "vocabulary_id": null | ||
187 | }, | 228 | }, | ||
188 | { | 229 | { | ||
189 | "display_name": "cybersecurity", | 230 | "display_name": "cybersecurity", | ||
190 | "id": "347264f0-397b-4a15-a091-afb7935c454c", | 231 | "id": "347264f0-397b-4a15-a091-afb7935c454c", | ||
191 | "name": "cybersecurity", | 232 | "name": "cybersecurity", | ||
192 | "state": "active", | 233 | "state": "active", | ||
193 | "vocabulary_id": null | 234 | "vocabulary_id": null | ||
194 | }, | 235 | }, | ||
195 | { | 236 | { | ||
196 | "display_name": "intrusion detection", | 237 | "display_name": "intrusion detection", | ||
197 | "id": "1278c825-2bdc-4d12-b22f-a4ca8154f5e3", | 238 | "id": "1278c825-2bdc-4d12-b22f-a4ca8154f5e3", | ||
198 | "name": "intrusion detection", | 239 | "name": "intrusion detection", | ||
199 | "state": "active", | 240 | "state": "active", | ||
200 | "vocabulary_id": null | 241 | "vocabulary_id": null | ||
201 | }, | 242 | }, | ||
202 | { | 243 | { | ||
203 | "display_name": "network flow", | 244 | "display_name": "network flow", | ||
204 | "id": "a7a3f196-855a-4221-906a-fdd77567e050", | 245 | "id": "a7a3f196-855a-4221-906a-fdd77567e050", | ||
205 | "name": "network flow", | 246 | "name": "network flow", | ||
206 | "state": "active", | 247 | "state": "active", | ||
207 | "vocabulary_id": null | 248 | "vocabulary_id": null | ||
208 | } | 249 | } | ||
209 | ], | 250 | ], | ||
210 | "title": "CICIDS2017", | 251 | "title": "CICIDS2017", | ||
211 | "type": "dataset", | 252 | "type": "dataset", | ||
212 | "version": "" | 253 | "version": "" | ||
213 | } | 254 | } |