Happy June Day, and glad to try and help out.
First, what is it that you'd like to do with this data set? If it provides good examples of a typical denial of service (impact) technique, what would you like to create from it?
As a preliminary step, you should use the Discover interface (left hand icon panel) to explore the data and learn what is actually parsed. You should make sure you adjust the time appropriately - if the data has timestamps, looking at the last 7 days of events may not show any results if the data was created last year or last month.
If you were interested in just understanding what a denial of service looks like, it will depend on what the data set depicts, but you could create some one-to-many or many-to-one visualizations in lens that visualize the relationship between source(s) and destination(s). I'll mention that this is less helpful if you want to understand what an individual denial of service attempt looks like, since they are only effective en masse; in other words, you want to try and visualize the phenomenon and not the parts of the whole.
If you wanted to develop detection logic such as rules or unsupervised ML jobs, a denial of service technique is probably best expressed as the number of connections to or from a specific point - if your data is properly parsed and you can see column headers for each field in the data set, you could begin at looking at high counts of connections. Both EQL and KQL could be helpful languages to learn if you're working on a home lab setup, either can express counts of network connections. We have some rules for unusual network behaviors that include denial of service and unsupervised ML examples for high counts of network activity, though ML support is a licensed (non-basic) feature you'd only be able to use in demo mode. You might want to check out the detection-rules repository for more information about our supported languages, tools and examples.
Looking forward to reading more!