Packet and Flow Based Network Intrusion Dataset

被引:0
作者
Gogoi, Prasanta [1 ]
Bhuyan, Monowar H. [1 ]
Bhattacharyya, D. K. [1 ]
Kalita, J. K. [2 ]
机构
[1] Tezpur Univ, Dept Comp Sc & Engg, Tezpur 784028, India
[2] Univ Colorado, Dept Comp Sci, Colorado Springs, CO USA
来源
CONTEMPORARY COMPUTING | 2012年 / 306卷
关键词
Testbed; Dataset; Packet; Netflow; Anomaly; NIDS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With exponential growth in the number of computer applications and the size of networks, the potential damage that can be caused by attacks launched over the internet keeps increasing dramatically. A number of network intrusion detection methods have been developed with their respective strengths and weaknesses. The majority of research in the area of network intrusion detection is still based on the simulated datasets because of non-availability of real datasets. A simulated dataset cannot represent the real network intrusion scenario. It is important to generate real and timely datasets to ensure accurate and consistent evaluation of methods. We propose a new real dataset to ameliorate this crucial shortcoming. We have set up a testbed to launch network traffic of both attack as well as normal nature using attack tools. We capture the network traffic in packet and flow format. The captured traffic is filtered and preprocessed to generate a featured dataset. The dataset is made available for research purpose.
引用
收藏
页码:322 / +
页数:3
相关论文
共 14 条
[1]  
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[2]   RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks [J].
Amini, Morteza ;
Jalili, Rasool ;
Shahriari, Hamid Reza .
COMPUTERS & SECURITY, 2006, 25 (06) :459-468
[3]  
[Anonymous], 1990, ARCHITECTURE NETWORK
[4]  
[Anonymous], 2011, INT J COMPUTER APPL
[5]  
Barbará D, 2001, SIGMOD RECORD, V30, P15, DOI 10.1145/604264.604268
[6]  
Bhuyan M.H., 2011, Proceedings of the International Conference on Communication, Computing Security, P531
[7]  
Gogoi P., 2011, P INT C COMM NETW SE, P19
[8]  
Gogoi P., 2011, INT J ADV ENG SCI, V1, P12
[9]  
Gogoi P., 2010, Journal of Convergence Information Technology, V5, P95, DOI DOI 10.4156/JCIT.VOL5.ISSUE1.11
[10]  
PAXSON V, 1998, P 7 USENIX SEC S SAN