Cargando…
The Westermo network traffic data set
There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not e...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10482735/ https://www.ncbi.nlm.nih.gov/pubmed/37691739 http://dx.doi.org/10.1016/j.dib.2023.109512 |
_version_ | 1785102237448536064 |
---|---|
author | Strandberg, Per Erik Söderman, David Dehlaghi-Ghadim, Alireza Leon, Miguel Markovic, Tijana Punnekkat, Sasikumar Moghadam, Mahshid Helali Buffoni, David |
author_facet | Strandberg, Per Erik Söderman, David Dehlaghi-Ghadim, Alireza Leon, Miguel Markovic, Tijana Punnekkat, Sasikumar Moghadam, Mahshid Helali Buffoni, David |
author_sort | Strandberg, Per Erik |
collection | PubMed |
description | There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificial intelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack. |
format | Online Article Text |
id | pubmed-10482735 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-104827352023-09-08 The Westermo network traffic data set Strandberg, Per Erik Söderman, David Dehlaghi-Ghadim, Alireza Leon, Miguel Markovic, Tijana Punnekkat, Sasikumar Moghadam, Mahshid Helali Buffoni, David Data Brief Data Article There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemporary industrial communication system, or do not easily support research focusing on distributed anomaly detection. This paper presents the Westermo network traffic data set, 1.8 million network packets recorded in over 90 minutes in a network built up of twelve hardware devices. In addition to the raw data in PCAP format, the data set also contains pre-processed data in the form of network flows in CSV files. This data set can support the research community for topics such as intrusion detection, anomaly detection, misconfiguration detection, distributed or federated artificial intelligence, and attack classification. In particular, we aim to use the data set to continue work on resource-constrained distributed artificial intelligence in edge devices. The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack. Elsevier 2023-08-24 /pmc/articles/PMC10482735/ /pubmed/37691739 http://dx.doi.org/10.1016/j.dib.2023.109512 Text en © 2023 The Authors https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Data Article Strandberg, Per Erik Söderman, David Dehlaghi-Ghadim, Alireza Leon, Miguel Markovic, Tijana Punnekkat, Sasikumar Moghadam, Mahshid Helali Buffoni, David The Westermo network traffic data set |
title | The Westermo network traffic data set |
title_full | The Westermo network traffic data set |
title_fullStr | The Westermo network traffic data set |
title_full_unstemmed | The Westermo network traffic data set |
title_short | The Westermo network traffic data set |
title_sort | westermo network traffic data set |
topic | Data Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10482735/ https://www.ncbi.nlm.nih.gov/pubmed/37691739 http://dx.doi.org/10.1016/j.dib.2023.109512 |
work_keys_str_mv | AT strandbergpererik thewestermonetworktrafficdataset AT sodermandavid thewestermonetworktrafficdataset AT dehlaghighadimalireza thewestermonetworktrafficdataset AT leonmiguel thewestermonetworktrafficdataset AT markovictijana thewestermonetworktrafficdataset AT punnekkatsasikumar thewestermonetworktrafficdataset AT moghadammahshidhelali thewestermonetworktrafficdataset AT buffonidavid thewestermonetworktrafficdataset AT strandbergpererik westermonetworktrafficdataset AT sodermandavid westermonetworktrafficdataset AT dehlaghighadimalireza westermonetworktrafficdataset AT leonmiguel westermonetworktrafficdataset AT markovictijana westermonetworktrafficdataset AT punnekkatsasikumar westermonetworktrafficdataset AT moghadammahshidhelali westermonetworktrafficdataset AT buffonidavid westermonetworktrafficdataset |