On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection

被引:41
|
作者
Cordero, Carlos Garcia [1 ]
Vasilomanolakis, Emmanouil [2 ]
Wainakh, Aidmar [1 ]
Muhlhauser, Max [3 ]
Nadjm-Tehrani, Simin [4 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[2] Aalborg Univ, Elect Syst, Cyber Secur Network, DK-2450 Copenhagen, Denmark
[3] Tech Univ Darmstadt, Informat Dept, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[4] Linkoping Univ, Dept Comp & Informat Syst, SE-58183 Linkoping, Sweden
关键词
Intrusion detection systems; datasets; attack injection; synthetic dataset; SYSTEM;
D O I
10.1145/3424155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most research in the field of network intrusion detection heavily relies on datasets. Datasets in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test related work, researchers usually need the same datasets or at least datasets with similar characteristics as the ones used in related work. In this work, we present concepts and the Intrusion Detection Dataset Toolkit (ID2T) to alleviate the problem of reproducing datasets with desired characteristics to enable an accurate replication of scientific results. Intrusion Detection Dataset Toolkit (ID2T) facilitates the creation of labeled datasets by injecting synthetic attacks into background traffic. The injected synthetic attacks created by ID2T blend with the background traffic by mimicking the background traffic's properties. This article has three core contributions. First, we present a comprehensive survey on intrusion detection datasets. In the survey, we propose a classification to group the negative qualities found in the datasets. Second, the architecture of ID2T is revised, improved, arid expanded in comparison to previous work. The architectural changes enable ID2T to inject recent and advanced attacks, such as the EternalBlue exploit or a peer-to-peer botnet. ID2T's functionality provides a set of tests, known as TIDED, that helps identify potential defects in the background traffic into which attacks are injected. Third, we illustrate how ID2T is used in different use-case scenarios to replicate scientific results with the help of reproducible datasets. ID2T is open source software and is made available to the community to expand its arsenal of attacks and capabilities.
引用
收藏
页数:39
相关论文
共 50 条
  • [1] A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems
    Hindy, Hanan
    Brosset, David
    Bayne, Ethan
    Seeam, Amar
    Tachtatzis, Christos
    Atkinson, Robert
    Bellekens, Xavier
    IEEE ACCESS, 2020, 8 : 104650 - 104675
  • [2] ERENO: A Framework for Generating Realistic IEC-61850 Intrusion Detection Datasets for Smart Grids
    Quincozes, Silvio Ereno
    Albuquerque, Celio
    Passos, Diego
    Mosse, Daniel
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3851 - 3865
  • [3] Improving intrusion detection for imbalanced network traffic
    Thomas, Ciza
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 309 - 324
  • [4] Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets
    Lewandowski, Brian
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 649 - 658
  • [5] A Comparative Study on the Impact of Adversarial Machine Learning Attacks on Contemporary Intrusion Detection Datasets
    Pujari M.
    Pacheco Y.
    Cherukuri B.
    Sun W.
    SN Computer Science, 3 (5)
  • [6] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [7] Datasets are not enough: Challenges in labeling network traffic
    Guerra, Jorge Luis
    Catania, Carlos
    Veas, Eduardo
    COMPUTERS & SECURITY, 2022, 120
  • [8] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
    Yang, Zhen
    Liu, Xiaodong
    Li, Tong
    Wu, Di
    Wang, Jinjiang
    Zhao, Yunwei
    Han, Han
    COMPUTERS & SECURITY, 2022, 116
  • [9] A Survey on the Latest Intrusion Detection Datasets for Software Defined Networking Environments
    Khalid, Harman Yousif Ibrahim
    Aldabagh, Najla Badie Ibrahim
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2024, 14 (02) : 13190 - 13200
  • [10] Synthetic Minority Oversampling Technique for Optimizing Classification Tasks in Botnet and Intrusion-Detection-System Datasets
    Gonzalez-Cuautle, David
    Hernandez-Suarez, Aldo
    Sanchez-Perez, Gabriel
    Karina Toscano-Medina, Linda
    Portillo-Portillo, Jose
    Olivares-Mercado, Jesus
    Manuel Perez-Meana, Hector
    Lucila Sandoval-Orozco, Ana
    APPLIED SCIENCES-BASEL, 2020, 10 (03):