GeNIS: A modular dataset for network intrusion detection and classification

被引:0
作者
Silva, Miguel [1 ]
Pinto, Daniela [1 ]
Vitorino, Joao [1 ]
Goncalves, Jose [1 ]
Maia, Eva [1 ]
Praca, Isabel [1 ]
机构
[1] Polytech Porto ISEP IPP, Sch Engn, Res Grp Intelligent Engn & Comp Adv Innovat & Dev, P-4249015 Porto, Portugal
来源
DATA IN BRIEF | 2025年 / 60卷
关键词
Network flow; Packet capture; Attack classification; Anomaly detection; Machine learning; Cybersecurity; Dataset;
D O I
10.1016/j.dib.2025.111487
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The development of artificial intelligence solutions for cyberattack detection and classification require high-quality and representative data. However, there is a scarcity of labelled datasets focused on the cyberattacks that target vulnerable small and medium-sized enterprises. To allow organizations to improve their intrusion detection systems according to their types of users, their active services, and the network protocols they use, it is necessary to provide reliable captures of different types of benign and malicious traffic. The GECAD Network Intrusion Scenarios (GeNIS) dataset contains multiple sequential attack scenarios and different types of realistic normal network activity, recorded during advanced network simulations on the Airbus CyberRange platform. The raw network packets were analyzed to generate labelled network flows, with the computation of statistical features to represent the traffic patterns of local and remote attackers, normal users and administrators, and background traffic of an enterprise computer network. GeNIS follows a modular design, providing raw packet capture next generation (PCAPNG) files with over 37 million packets of each intermediate attack step to enable an in-depth analysis with different flow exporters, feature extraction, and feature selection tools, as well as filtered CSV files with over 2.8 million flows created with 5, 10, 30, and 60 s flow intervals. The flows were preprocessed to provide a reliable benchmark dataset with the most relevant features for the training, validation, and testing of robust machine learning and deep learning models.
引用
收藏
页数:14
相关论文
共 50 条
[41]   MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset [J].
Rosay, Arnaud ;
Carlier, Florent ;
Leroux, Pascal .
MACHINE LEARNING FOR NETWORKING (MLN 2019), 2020, 12081 :240-254
[42]   Sugarcane leaf dataset: A dataset for disease detection and classification for machine learning applications [J].
Thite, Sandip ;
Suryawanshi, Yogesh ;
Patil, Kailas ;
Chumchu, Prawit .
DATA IN BRIEF, 2024, 53
[43]   Hybrid network intrusion detection system based on sliding window and information entropy in imbalanced dataset [J].
Mo, Jingrong ;
Ke, Jie ;
Zhou, Huiyi ;
Li, Xunzhang .
APPLIED INTELLIGENCE, 2025, 55 (06)
[44]   Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern Data [J].
Verkerken, Miel ;
D'hooge, Laurens ;
Wauters, Tim ;
Volckaert, Bruno ;
De Turck, Filip .
2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
[45]   Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles [J].
Gou, Wanting ;
Zhang, Haodi ;
Zhang, Ronghui .
SENSORS, 2023, 23 (21)
[46]   Intrusion Detection Over Encrypted Network Data [J].
Karacay, Leyli ;
Savas, Erkay ;
Alptekin, Halit .
COMPUTER JOURNAL, 2020, 63 (04) :604-619
[47]   Intrusion detection system for controller area network [J].
Tanksale, Vinayak .
CYBERSECURITY, 2024, 7 (01)
[48]   Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems [J].
Babic, Ivan ;
Miljkovic, Aleksandar ;
Cabarkapa, Milan ;
Nikolic, Vojkan ;
Dordevic, Aleksandar ;
Randelovic, Milan ;
Randelovic, Dragan .
SYMMETRY-BASEL, 2021, 13 (04)
[49]   Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems [J].
Stefanova, Zheni ;
Ramachandran, Kandethody .
2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
[50]   A two-stage hybrid classification technique for network intrusion detection system [J].
Jamal Hussain ;
Samuel Lalmuanawma ;
Lalrinfela Chhakchhuak .
International Journal of Computational Intelligence Systems, 2016, 9 :863-875