DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system

被引:3
|
作者
Mittal, Meenakshi [1 ]
Kumar, Krishan [1 ]
Behal, Sunny [2 ]
机构
[1] PanjabUniv, Dept Informat Technol, UIET, Chandigarh, India
[2] Shaheed Bhagat Singh State Univ, Dept CSE, Ferozepur, Punjab, India
来源
关键词
Application layer; CORE emulator; DDoS-AT-2022; Emulation based; Network traffic; Transport layer;
D O I
10.1007/s43538-023-00159-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The existing prominent research in the field of network security has extensively used publicly available emulated datasets for validating the defense mechanisms. Although many datasets are publicly accessible on the Internet but their suitability and relevance for DDoS defense validation remain an issue so far. The increase in the volume of network traffic over the years has led to the failure of most of the existing Distributed Denial of Service (DDoS) defense solutions as they are not validated over a large volume of network traffic. Also, most of the existing datasets have been generated through simulation and those which are generated through emulation-based don't contain the proper mixture of various types of attacks. In this paper, we have designed a DDoS-Testbed (DDoS-TB) and generated an emulation-based dataset for DDoS attacks at the Application and Transport layer (DDoS-AT-2022) using various benchmarked tools. The generated dataset contains a mixture of legitimate traffic, flash traffic, and various DDoS attacks at the application and transport layer with different attack rates (like low, slow, and flood). Hence, the DDoS-TB design and the generated DDoS-AT-2022 dataset can surely be helpful to the research community in validating their new DDoS defense mechanisms.
引用
收藏
页码:306 / 324
页数:19
相关论文
共 50 条
  • [21] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Thapngam, Theerasak
    Yu, Shui
    Zhou, Wanlei
    Makki, S. Kami
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 346 - 358
  • [22] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Theerasak Thapngam
    Shui Yu
    Wanlei Zhou
    S. Kami Makki
    Peer-to-Peer Networking and Applications, 2014, 7 : 346 - 358
  • [23] Deep learning model for distributed denial of service (DDoS) detection
    Tennakoon, Chaminda
    Fernando, Subha
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (02): : 109 - 118
  • [24] A New Framework for Classification of Distributed Denial of Service (DDOS) Attack in Cloud Computing by Machine Learning Techniques
    Behzadi, Mostafa
    Mahmod, Ramlan
    Barati, Mehdi
    Abdullah, Azizol Bin Hj
    Noura, Mahda
    ADVANCED SCIENCE LETTERS, 2014, 20 (01) : 175 - 178
  • [25] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [26] The Distributed Denial of Service Attacks (DDoS) Prevention Mechanisms on Application Layer
    Bhosale, Karuna S.
    Nenova, Maria
    Iliev, Georgi
    2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 136 - 139
  • [27] Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
    Karnani, Suruchi
    Shakya, Harish Kumar
    INFORMATION SECURITY JOURNAL, 2023, 32 (06): : 444 - 468
  • [28] Present Status of Distributed Denial of service (DDoS) Attacks in Internet World
    Singh, Rajeev
    Sharma, T. P.
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2019, 4 (04) : 1008 - 1017
  • [29] Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
    Vanitha, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 90 - 96
  • [30] Detecting Distributed Denial of Service (DDoS) attacks through inductive learning
    Noh, S
    Lee, C
    Choi, K
    Jung, GH
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 286 - 295