TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection

被引:12
作者
Herzalla, Dania [1 ]
Lunardi, Willian Tessaro [1 ]
Andreoni, Martin [1 ]
机构
[1] Technol Innovat Inst, Abu Dhabi, U Arab Emirates
关键词
Network traffic dataset; intrusion detection; network security; anomaly detection; machine learning; DOS ATTACKS;
D O I
10.1109/ACCESS.2023.3319213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The effectiveness of network intrusion detection systems, predominantly based on machine learning, is highly influenced by the dataset they are trained on. Ensuring an accurate reflection of the multifaceted nature of benign and malicious traffic in these datasets is paramount for creating IDS models capable of recognizing and responding to a wide array of intrusion patterns. However, existing datasets often fall short, lacking the necessary diversity and alignment with the contemporary network environment, thereby limiting the effectiveness of intrusion detection. This paper introduces TII-SSRC-23, a novel and comprehensive dataset designed to overcome these challenges. Comprising a diverse range of traffic types and subtypes, our dataset is a robust and versatile tool for the research community. Additionally, we conduct a feature importance analysis, providing vital insights into critical features for intrusion detection tasks. Through extensive experimentation, we also establish firm baselines for supervised and unsupervised intrusion detection methodologies using our dataset, further contributing to the advancement and adaptability of IDS models in the rapidly changing landscape of network security. Our dataset is available at https://kaggle.com/datasets/daniaherzalla/tii-ssrc-23.
引用
收藏
页码:118577 / 118594
页数:18
相关论文
共 25 条
[1]  
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[2]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[3]  
Bhuyan M.H., 2015, International Journal of Network Security, V17, P683
[4]   Towards the Development of a Realistic Multidimensional IoT Profiling Dataset [J].
Dadkhah, Sajjad ;
Mahdikhani, Hassan ;
Danso, Priscilla Kyei ;
Zohourian, Alireza ;
Truong, Kevin Anh ;
Ghorbani, Ali A. .
2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
[5]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[6]   Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Hamouda, Djallel ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE ACCESS, 2022, 10 :40281-40306
[7]   An empirical comparison of botnet detection methods [J].
Garcia, S. ;
Grill, M. ;
Stiborek, J. ;
Zunino, A. .
COMPUTERS & SECURITY, 2014, 45 :100-123
[8]   Toward the Protection of IoT Networks: Introducing the LATAM-DDoS-IoT Dataset [J].
Genaro Almaraz-Rivera, Josue ;
Arturo Perez-Diaz, Jesus ;
Antonio Cantoral-Ceballos, Jose ;
Felipe Botero, Juan ;
Trejo, Luis A. .
IEEE ACCESS, 2022, 10 :106909-106920
[9]  
Gringoli F, 2009, COMPUT COMMUN REV, V39, P12, DOI DOI 10.1145/1629607.1629610
[10]   Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling [J].
Jazi, Hossein Hadian ;
Gonzalez, Hugo ;
Stakhanova, Natalia ;
Ghorbani, Ali A. .
COMPUTER NETWORKS, 2017, 121 :25-36