Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset

被引:0
|
作者
Abu Al-Haija, Qasem [1 ]
Masoud, Zaid [1 ]
Yasin, Assim [1 ]
Alesawi, Karam [1 ]
Alkarnawi, Yousef [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Cybersecur, Amman, Jordan
关键词
Data Collection; Data Engineering; Packet Analyzer; Virtualization; Intrusion Detection/Classification; Cybersecurity;
D O I
10.1109/ICICS63486.2024.10638287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Performance evaluation of cutting-edge dielectric elastomers for large-scale actuator applications
    Jordi, C.
    Schmidt, A.
    Kovacs, G.
    Michel, S.
    Ermanni, P.
    SMART MATERIALS AND STRUCTURES, 2011, 20 (07)
  • [2] Loquat: A Framework for Large-Scale Actor Communication on Edge Networks
    Meiklejohn, Christopher S.
    Van Roy, Peter
    2017 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2017,
  • [3] Introducing a Large-Scale Dataset for Vietnamese POS Tagging on Conversational Texts
    Oanh Thi Tran
    Tu Minh Pham
    Vu Hoang Dang
    Bang Ba Xuan Nguyen
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION (LREC 2020), 2020, : 3913 - 3921
  • [4] DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence
    Wang, Xuren
    Liu, Xinpei
    Ao, Shengqin
    Li, Ning
    Jiang, Zhengwei
    Xu, Zongyi
    Xiong, Zihan
    Xiong, Mengbo
    Zhang, Xiaoqing
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1842 - 1848
  • [5] LARGE-SCALE COMMUNICATION NETWORKS - DESIGN AND ANALYSIS
    FISCHER, MJ
    GARBIN, DA
    HARRIS, TC
    KNEPLEY, JE
    OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1978, 6 (04): : 331 - 340
  • [6] The emergence of roles in large-scale networks of communication
    Sandra González-Bailón
    Ning Wang
    Javier Borge-Holthoefer
    EPJ Data Science, 3
  • [7] The emergence of roles in large-scale networks of communication
    Gonzalez-Bailon, Sandra
    Wang, Ning
    Borge-Holthoefer, Javier
    EPJ DATA SCIENCE, 2014, 3 (01) : 1 - 16
  • [8] Revolutionizing construction safety: introducing a cutting-edge virtual reality interactive system for training US construction workers to mitigate fall hazards
    Alzarrad, Ammar
    Miller, Matthew
    Durham, Luke
    Chowdhury, Sudipta
    FRONTIERS IN BUILT ENVIRONMENT, 2024, 10
  • [9] Decoding context memories for threat in large-scale neural networks
    Crombie, Kevin M.
    Azar, Ameera
    Botsford, Chloe
    Heilicher, Mickela
    Jaeb, Michael
    Gruichich, Tijana Sagorac
    Schomaker, Chloe M.
    Williams, Rachel
    Stowe, Zachary N.
    Dunsmoor, Joseph E.
    Cisler, Josh M.
    CEREBRAL CORTEX, 2024, 34 (02)
  • [10] Tyrosine Kinase Inhibitor Lenvatinib Based Nano Formulations and Cutting-Edge Scale-Up Technologies in revolutionizing Cancer Therapy
    Shaikh, Samia
    Chary, Padakanti Sandeep
    Mehra, Neelesh Kumar
    ACS APPLIED BIO MATERIALS, 2025, 8 (03): : 1749 - 1784