On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection

被引:41
|
作者
Cordero, Carlos Garcia [1 ]
Vasilomanolakis, Emmanouil [2 ]
Wainakh, Aidmar [1 ]
Muhlhauser, Max [3 ]
Nadjm-Tehrani, Simin [4 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[2] Aalborg Univ, Elect Syst, Cyber Secur Network, DK-2450 Copenhagen, Denmark
[3] Tech Univ Darmstadt, Informat Dept, Telecooperat Grp, D-64289 Darmstadt, Hessen, Germany
[4] Linkoping Univ, Dept Comp & Informat Syst, SE-58183 Linkoping, Sweden
关键词
Intrusion detection systems; datasets; attack injection; synthetic dataset; SYSTEM;
D O I
10.1145/3424155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most research in the field of network intrusion detection heavily relies on datasets. Datasets in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test related work, researchers usually need the same datasets or at least datasets with similar characteristics as the ones used in related work. In this work, we present concepts and the Intrusion Detection Dataset Toolkit (ID2T) to alleviate the problem of reproducing datasets with desired characteristics to enable an accurate replication of scientific results. Intrusion Detection Dataset Toolkit (ID2T) facilitates the creation of labeled datasets by injecting synthetic attacks into background traffic. The injected synthetic attacks created by ID2T blend with the background traffic by mimicking the background traffic's properties. This article has three core contributions. First, we present a comprehensive survey on intrusion detection datasets. In the survey, we propose a classification to group the negative qualities found in the datasets. Second, the architecture of ID2T is revised, improved, arid expanded in comparison to previous work. The architectural changes enable ID2T to inject recent and advanced attacks, such as the EternalBlue exploit or a peer-to-peer botnet. ID2T's functionality provides a set of tests, known as TIDED, that helps identify potential defects in the background traffic into which attacks are injected. Third, we illustrate how ID2T is used in different use-case scenarios to replicate scientific results with the help of reproducible datasets. ID2T is open source software and is made available to the community to expand its arsenal of attacks and capabilities.
引用
收藏
页数:39
相关论文
共 50 条
  • [41] Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach
    Li, Xiping
    Dong, Wei
    Sun, Yi
    Chen, Shaolong
    Kong, Detong
    Yang, Shujie
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1364 - 1369
  • [42] A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
    Kosmanos, Dimitrios
    Pappas, Apostolos
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Aparicio-Navarro, Francisco J.
    Argyriou, Antonios
    Janicke, Helge
    ARRAY, 2020, 5
  • [43] A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
    Luis Gutierrez-Garcia, Jose
    Sanchez-DelaCruz, Eddy
    del Pilar Pozos-Parra, Maria
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 59 - 78
  • [44] A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems
    Khoei, Tala Talaei
    Kaabouch, Naima
    INFORMATION, 2023, 14 (02)
  • [45] Improved Robust Adversarial Model against Evasion Attacks on Intrusion Detection Systems
    Anaedevha, R. N.
    Trofimov, A. G.
    OPTICAL MEMORY AND NEURAL NETWORKS, 2024, 33 (SUPPL3) : S414 - S423
  • [46] Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks
    Iashvili, Giorgi
    Iavich, Maksim
    Bocu, Razvan
    Odarchenko, Roman
    Gnatyuk, Sergiy
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 861 - 864
  • [47] Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks
    El Asry, Chadia
    Benchaji, Ibtissam
    Douzi, Samira
    El Ouahidi, Bouabid
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (09) : 1070 - 1078
  • [48] Network Intrusion Detection Technology Based on Convolutional Neural Network and BiGRU
    Cao, Bo
    Li, Chenghai
    Song, Yafei
    Fan, Xiaoshi
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [49] Development and Validation of Dataset for Intrusion Detection System over Real Traffic
    Siyyal, Shafqat Ali
    Khuhawar, Faheem Yar
    Shaikh, Muhammad Raza
    Memon, Aftab A.
    Chowdhry, Bhawani S.
    Shaikh, M. Zakir
    Kumar, Ambuj
    Uqaili, Muhammad Aslam
    2022 25TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2022,
  • [50] A new intrusion detection method based on data-oriented classification of attacks
    Zou, Tao
    Chen, Hua
    Zhang, Cui
    Huang, Minhuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE: COMPUTER SCIENCE CHALLENGES, 2007, : 197 - +