You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spot.apache.org by br...@apache.org on 2017/09/14 22:20:00 UTC

[10/15] incubator-spot git commit: Edit.

Edit.


Project: http://git-wip-us.apache.org/repos/asf/incubator-spot/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-spot/commit/5af32e77
Tree: http://git-wip-us.apache.org/repos/asf/incubator-spot/tree/5af32e77
Diff: http://git-wip-us.apache.org/repos/asf/incubator-spot/diff/5af32e77

Branch: refs/heads/master
Commit: 5af32e77b50b5541b25280ace766c2a41d579819
Parents: fafae28
Author: Brandon Edwards <br...@intel.com>
Authored: Wed Sep 6 13:10:33 2017 -0700
Committer: Brandon Edwards <br...@intel.com>
Committed: Wed Sep 6 13:10:33 2017 -0700

----------------------------------------------------------------------
 spot-ml/DATA_SAMPLE.md | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/incubator-spot/blob/5af32e77/spot-ml/DATA_SAMPLE.md
----------------------------------------------------------------------
diff --git a/spot-ml/DATA_SAMPLE.md b/spot-ml/DATA_SAMPLE.md
index 5b7d412..c4fa4be 100644
--- a/spot-ml/DATA_SAMPLE.md
+++ b/spot-ml/DATA_SAMPLE.md
@@ -1,13 +1,13 @@
 
 # DNS Labeled Data Set
 
-An IXIA BreakingPoint box was used to simulate both normal and attack (DNS tunnelling) DNS traffic. The resulting pcaps were obtained and fields relevant to Apache Spot (incubating) were injested. The attacks can be differentiated from the normal activity due to codes that were inserted into the Transaction ID field (upon ingestion: ‘dns_id’) which identifies either the fact that the traffic was normal or identifies the specific DNS tunneling activity being used. We provide the schema for the injested pcap data as well as the location and specifications the ingested data within Amazon-S3. Information is also provided for how to interpret the dns_id field..
+An IXIA BreakingPoint box was used to simulate both normal and attack (DNS tunnelling) DNS traffic. The resulting pcaps were obtained and fields relevant to Apache Spot (incubating) were injested. The attacks can be differentiated from the normal activity due to codes that were inserted into the Transaction ID field (upon ingestion: ‘dns_id’) which identifies either the fact that the traffic was normal or identifies the specific DNS tunneling activity being used. We provide the data schema as well as the location and specifications of the data within Amazon-S3. Information is also provided for how to interpret the dns_id field.
 
 
 
 ## Data Schema
 
-The schema for this data includes one field ('dns_id') in addition to what is usually used for DNS data in Apache Spot (incubating). The schema is as follows:
+The schema for this data includes one field (called 'dns_id') in addition to what is usually used for DNS data in Apache Spot (incubating). The schema is as follows:
 
 
 | Name         | Type      |
@@ -45,7 +45,7 @@ Within Apache Spot (incubating), only responses from DNS servers are ingested si
 
 | Simulation Date   | Type  | Location  | Size  | Additional Comments   |
 |-------------------|:------|:---------:|:-----:|:---------------------:|
-| May 9, 2017       | Tarball of ingested data (parquet format) | | | |
+| May 9, 2017       | Tarball of ingested data (parquet format) | | 5.3G | |
 
 
 ## Number of Rows associated to each Value of dns_id