Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset

被引:0
|
作者
Abu Al-Haija, Qasem [1 ]
Masoud, Zaid [1 ]
Yasin, Assim [1 ]
Alesawi, Karam [1 ]
Alkarnawi, Yousef [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Cybersecur, Amman, Jordan
关键词
Data Collection; Data Engineering; Packet Analyzer; Virtualization; Intrusion Detection/Classification; Cybersecurity;
D O I
10.1109/ICICS63486.2024.10638287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Networks
    Yao, Yao
    Luo, Zixin
    Li, Shiwei
    Zhang, Jingyang
    Ren, Yufan
    Zhou, Lei
    Fang, Tian
    Quan, Long
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 1787 - 1796
  • [22] Enabling Large-Scale Federated Learning over Wireless Edge Networks
    Thinh Quang Dinh
    Nguyen, Diep N.
    Dinh Thai Hoang
    Pham Tran Vu
    Dutkiewicz, Eryk
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [23] Group Based Secure Communication for Large-Scale Wireless Sensor Networks
    Kifayat, Kashif
    Merabti, Madjid
    Shi, Qi
    Llewellyn-Jones, David
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (02): : 139 - 152
  • [24] Bounds for call completion probabilities in large-scale mobile communication networks
    Ozawa, T
    Takahashi, N
    Takahashi, Y
    JOURNAL OF THE OPERATIONS RESEARCH SOCIETY OF JAPAN, 2004, 47 (04) : 339 - 358
  • [25] Communication Efficiency and Congestion of Signal Traffic in Large-Scale Brain Networks
    Misic, Bratislav
    Sporns, Olaf
    McIntosh, Anthony R.
    PLOS COMPUTATIONAL BIOLOGY, 2014, 10 (01)
  • [26] Visualization, documentation, analysis, and communication of large-scale gene regulatory networks
    Longabaugh, William J. R.
    Davidson, Eric H.
    Bolouri, Hamid
    BIOCHIMICA ET BIOPHYSICA ACTA-GENE REGULATORY MECHANISMS, 2009, 1789 (04): : 363 - 374
  • [27] An Efficient Scheme for Secure Communication in Large-Scale Wireless Sensor Networks
    Su, Zhong
    Lin, Chuang
    Ren, Fengyuan
    Jiang, Yixin
    Chu, Xiaowen
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 333 - +
  • [28] LARGE-SCALE NETWORK ANALYSIS WITH APPLICATIONS TO TRANSPORTATION, COMMUNICATION AND INFERENCE NETWORKS
    TEH, HH
    FOO, MF
    DISCRETE MATHEMATICS, 1988, 72 (1-3) : 347 - 353
  • [29] Interoperability of Electricity Distribution and Communication Networks in Large-Scale Outage Situations
    Horsmanheimo, Seppo
    Maskey, Niwas
    Tuomimaki, Lotta
    Maki, Kari
    2015 IEEE INTERNATIONAL TELECOMMUNICATIONS ENERGY CONFERENCE (INTELEC), 2015,
  • [30] Distributed binary quantizers for communication constrained large-scale sensor networks
    Lin, Ying
    Chen, Biao
    Willett, Peter
    Suter, Bruce
    2006 9th International Conference on Information Fusion, Vols 1-4, 2006, : 1312 - 1316