On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection

被引:41
|
作者
Cordero, Carlos Garcia [1 ]
Vasilomanolakis, Emmanouil [2 ]
Wainakh, Aidmar [1 ]
Muhlhauser, Max [3 ]
Nadjm-Tehrani, Simin [4 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[2] Aalborg Univ, Elect Syst, Cyber Secur Network, DK-2450 Copenhagen, Denmark
[3] Tech Univ Darmstadt, Informat Dept, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[4] Linkoping Univ, Dept Comp & Informat Syst, SE-58183 Linkoping, Sweden
关键词
Intrusion detection systems; datasets; attack injection; synthetic dataset; SYSTEM;
D O I
10.1145/3424155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most research in the field of network intrusion detection heavily relies on datasets. Datasets in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test related work, researchers usually need the same datasets or at least datasets with similar characteristics as the ones used in related work. In this work, we present concepts and the Intrusion Detection Dataset Toolkit (ID2T) to alleviate the problem of reproducing datasets with desired characteristics to enable an accurate replication of scientific results. Intrusion Detection Dataset Toolkit (ID2T) facilitates the creation of labeled datasets by injecting synthetic attacks into background traffic. The injected synthetic attacks created by ID2T blend with the background traffic by mimicking the background traffic's properties. This article has three core contributions. First, we present a comprehensive survey on intrusion detection datasets. In the survey, we propose a classification to group the negative qualities found in the datasets. Second, the architecture of ID2T is revised, improved, arid expanded in comparison to previous work. The architectural changes enable ID2T to inject recent and advanced attacks, such as the EternalBlue exploit or a peer-to-peer botnet. ID2T's functionality provides a set of tests, known as TIDED, that helps identify potential defects in the background traffic into which attacks are injected. Third, we illustrate how ID2T is used in different use-case scenarios to replicate scientific results with the help of reproducible datasets. ID2T is open source software and is made available to the community to expand its arsenal of attacks and capabilities.
引用
收藏
页数:39
相关论文
共 50 条
  • [21] A Dynamic Intrusion Detection System Capable of Detecting Unknown Attacks
    Xing, Na
    Zhao, Shuai
    Wang, Yuehai
    Ning, Keqing
    Liu, Xiufeng
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 391 - 400
  • [22] A hybrid intelligent intrusion detection system to recognize novel attacks
    Tsai, DR
    Tai, WP
    Chang, CF
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 428 - 434
  • [23] A Hybrid Approach for Network Intrusion Detection
    Mehmood, Mavra
    Javed, Talha
    Nebhen, Jamel
    Abbas, Sidra
    Abid, Rabia
    Bojja, Giridhar Reddy
    Rizwan, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 91 - 107
  • [24] An Extensive Survey on Intrusion Detection Systems: Datasets and Challenges for Modern Scenario
    Hnamte, Vanlalruata
    Hussain, Jamal
    2021 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND INSTRUMENTATION ENGINEERING (IEEE ICECIE'2021), 2021,
  • [25] A Comparative Study on Contemporary Intrusion Detection Datasets for Machine Learning Research
    Dwibedi, Smirti
    Pujari, Medha
    Sun, Weiqing
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 123 - 128
  • [26] Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems
    Mohammed, Ahmad Burhan
    Fourati, Lamia Chaari
    COMPUTERS & SECURITY, 2025, 150
  • [27] Generating and Testing Synthetic Datasets for Recommender Systems to Improve Fairness in Collaborative Filtering Research
    Bobadilla, J.
    Gutierrez, A.
    2023 20TH ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, AICCSA, 2023,
  • [28] A hybrid intrusion detection system for virtual jamming attacks on wireless networks
    Santoro, Diego
    Escudero-Andreu, Gines
    Kyriakopoulos, Konstantinos G.
    Aparicio-Navarro, Francisco J.
    Parish, David J.
    Vadursi, Michele
    MEASUREMENT, 2017, 109 : 79 - 87
  • [29] Generating real-world-like labelled synthetic datasets for construction site applications
    Barrera-Animas, Ari Yair
    Delgado, Juan Manuel Davila
    AUTOMATION IN CONSTRUCTION, 2023, 151
  • [30] Extraction of Minimal Set of Traffic Features Using Ensemble of Classifiers and Rank Aggregation for Network Intrusion Detection Systems
    Krupski, Jacek
    Iwanowski, Marcin
    Graniszewski, Waldemar
    APPLIED SCIENCES-BASEL, 2024, 14 (16):