Cargando…

Botnet dataset with simultaneous attack activity

The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities. The dataset is generated from a simulation process by extracting...

Descripción completa

Detalles Bibliográficos
Autores principales: Putra, Muhammad Aidiel Rachman, Hostiadi, Dandy Pramana, Ahmad, Tohari
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9679537/
https://www.ncbi.nlm.nih.gov/pubmed/36426071
http://dx.doi.org/10.1016/j.dib.2022.108628
Descripción
Sumario:The proposed dataset shows characteristics of simultaneous botnet attack activities. Botnet network traffic has sequentially interconnected as formed as bidirectional network flow (binetflow), which is combined with normal activities. The dataset is generated from a simulation process by extracting botnet pattern behaviors taken from CTU-13 and NCC datasets. The extraction results are utilized as the basis for simulations to produce a new dataset with simultaneous botnet attack activities. The term “simultaneous attack activities” refers to an attack activity that involves multiple botnets and happens at the same time. The dataset contains several botnet types distributed over three detection sensors. Each dataset has 18 network header features with a total recording duration of 8 h. The bot attack spreads must be appropriately handled by efficient processing, also known as parallel computation detection.