LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection

被引:65
|
作者
Damasevicius, Robertas [1 ]
Venckauskas, Algimantas [1 ]
Grigaliunas, Sarunas [1 ]
Toldinas, Jevgenijus [1 ]
Morkevicius, Nerijus [1 ]
Aleliunas, Tautvydas [1 ]
Smuikys, Paulius [1 ]
机构
[1] Kaunas Univ Technol, Fac Informat, LT-51386 Kaunas, Lithuania
基金
欧盟地平线“2020”;
关键词
benchmark dataset; network intrusion detection; network attack; cyber security; ANOMALY DETECTION SYSTEMS; USER AUTHENTICATION; NEURAL-NETWORK; ATTACKS; SECURITY; INTERNET; CHALLENGES; FRAMEWORK; DESIGN; THINGS;
D O I
10.3390/electronics9050800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection is one of the main problems in ensuring the security of modern computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In order to develop efficient network-intrusion-detection methods, realistic and up-to-date network flow datasets are required. Despite several recent efforts, there is still a lack of real-world network-based datasets which can capture modern network traffic cases and provide examples of many different types of network attacks and intrusions. To alleviate this need, we present LITNET-2020, a new annotated network benchmark dataset obtained from the real-world academic network. The dataset presents real-world examples of normal and under-attack network traffic. We describe and analyze 85 network flow features of the dataset and 12 attack types. We present the analysis of the dataset features by using statistical analysis and clustering methods. Our results show that the proposed feature set can be effectively used to identify different attack classes in the dataset. The presented network dataset is made freely available for research purposes.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] An optimized hybrid deep neural network architecture for intrusion detection in real-time IoT networks
    Shobana, M.
    Shanmuganathan, C.
    Challa, Nagendra Panini
    Ramya, S.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (12)
  • [22] A Combined Approach for Operational Scheduling of a Real-World Pipeline Network
    Boschetto, Suelen N.
    Neves-, Flavio, Jr.
    Magatao, Leandro
    Brondani, William M.
    Arruda, Lucia V. R.
    Ribas, Paulo C.
    10TH INTERNATIONAL SYMPOSIUM ON PROCESS SYSTEMS ENGINEERING, 2009, 27 : 621 - 626
  • [23] A Neural Attention Model for Real-Time Network Intrusion Detection
    Tan, Mengxuan
    Iacovazzi, Alfonso
    Cheung, Ngai-Man
    Elovici, Yuval
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 291 - 299
  • [24] A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset
    Zhang, Chongzhen
    Ruan, Fangming
    Yin, Lan
    Chen, Xi
    Zhai, Lidong
    Liu, Feng
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 41 - 45
  • [25] CarTwin-Development of a Digital Twin for a Real-World In-Vehicle CAN Network
    Popa, Lucian
    Berdich, Adriana
    Groza, Bogdan
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [26] Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset
    Chua, Tuan-Hong
    Salam, Iftekhar
    SYMMETRY-BASEL, 2023, 15 (06):
  • [27] A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model
    Pontes, Camila F. T.
    de Souza, Manuela M. C.
    Gondim, Joao J. C.
    Bishop, Matt
    Marotta, Marcelo Antonio
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1125 - 1136
  • [28] A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility
    Georgopoulos, Panagiotis
    McCarthy, Ben
    Edwards, Christopher
    NETWORKING 2011, PT I, 2011, 6640 : 212 - 226
  • [29] Flexible and Robust Real-Time Intrusion Detection Systems to Network Dynamics
    Yu, Kicho
    Khanh Nguyen
    Park, Younghee
    IEEE ACCESS, 2022, 10 : 98959 - 98969
  • [30] Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes
    Bartos, Karel
    Grill, Martin
    Krmicek, Vojtech
    Rehak, Martin
    Celeda, Pavel
    CESNET CONFERENCE 2008-SECURITY, MIDDLEWARE, AND VIRTUALIZATION-GLUE OF FUTURE NETWORKS, 2008, : 49 - 56