Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset

被引:0
|
作者
Abu Al-Haija, Qasem [1 ]
Masoud, Zaid [1 ]
Yasin, Assim [1 ]
Alesawi, Karam [1 ]
Alkarnawi, Yousef [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Cybersecur, Amman, Jordan
关键词
Data Collection; Data Engineering; Packet Analyzer; Virtualization; Intrusion Detection/Classification; Cybersecurity;
D O I
10.1109/ICICS63486.2024.10638287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] AN EFFICIENT DESIGN OF LARGE-SCALE COMMUNICATION-NETWORKS WITH A DECOMPOSITION TECHNIQUE
    KANG, SM
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1980, 27 (12): : 1169 - 1175
  • [32] Power Line Communication Networks for Large-Scale Control and Automation Systems
    Bumiller, Gerd
    Lampe, Lutz
    Hrasnica, Halid
    IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (04) : 106 - 113
  • [33] Traffic Shaping at the Edge: Enabling Bounded Latency for Large-scale Deterministic Networks
    Peng, Guoyu
    Wang, Shuo
    Huang, Yudong
    Huo, Ru
    Huang, Tao
    Liu, Yunjie
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [34] A Stackelberg Game Approach to Proactive Caching in Large-Scale Mobile Edge Networks
    Zheng, Zijie
    Song, Lingyang
    Han, Zhu
    Li, Geoffrey Ye
    Poor, H. Vincent
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (08) : 5198 - 5211
  • [35] Edge Learning for Large-Scale Internet of Things With Task-Oriented Efficient Communication
    Xie, Haihui
    Xia, Minghua
    Wu, Peiran
    Wang, Shuai
    Poor, H. Vincent
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9517 - 9532
  • [36] Exploring Fast and Communication-Efficient Algorithms in Large-scale Distributed Networks
    Yu, Yue
    Wu, Jiaxiang
    Huang, Junzhou
    22ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 89, 2019, 89 : 674 - 683
  • [37] A survey of strategies for communication networks to protect against large-scale natural disasters
    Gomes, Teresa
    Tapolcai, Janos
    Esposito, Christian
    Hutchison, David
    Kuipers, Fernando
    Rak, Jacek
    de Sousa, Amaro
    Iossifides, Athanasios
    Travanca, Rui
    Andre, Joao
    Jorge, Luisa
    Martins, Lucia
    Ugalde, Patricia Ortiz
    Pasic, Alija
    Pezaros, Dimitrios
    Jouet, Simon
    Secci, Stefano
    Tornatore, Massimo
    PROCEEDINGS OF 2016 8TH INTERNATIONAL WORKSHOP ON RESILIENT NETWORKS DESIGN AND MODELING (RNDM), 2016, : 11 - 22
  • [38] A Floating Linear Voltage Regulator for Powering Large-Scale Differential Communication Networks
    Jovicic, Nenad S.
    Rajovic, Vladimir M.
    IEEE ACCESS, 2018, 6 : 24669 - 24679
  • [39] Performance Evaluation of LoRaWAN Communication Scalability in Large-Scale Wireless Sensor Networks
    Lavric, Alexandru
    Popa, Valentin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [40] Covert Communication in Large-Scale Multi-Tier LEO Satellite Networks
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Hossain, Ekram
    Wei, Guiyi
    Ni, Zhengwei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 11576 - 11587