This database includes a standard set of data to be audited, which contains a wide variety of intrusions simulated in a military network environment.At present, many models set up for network intrusion detection systems are based on this data set for experiments [14].