Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset

被引:0
|
作者
Abu Al-Haija, Qasem [1 ]
Masoud, Zaid [1 ]
Yasin, Assim [1 ]
Alesawi, Karam [1 ]
Alkarnawi, Yousef [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Cybersecur, Amman, Jordan
关键词
Data Collection; Data Engineering; Packet Analyzer; Virtualization; Intrusion Detection/Classification; Cybersecurity;
D O I
10.1109/ICICS63486.2024.10638287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] On characteristics of multi-hop communication in large-scale clustered sensor networks
    Kiri, Yuichi
    Sugano, Masashi
    Murata, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (02) : 228 - 238
  • [42] Group communication for large-scale distributed systems over IP multicast networks
    Mathur, AG
    INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-IV, PROCEEDINGS, 1998, : 710 - 717
  • [43] Modeling and Performance Analysis of Large-Scale Backscatter Communication Networks with Directional Antennas
    Wang, Qiu
    Zhou, Yong
    SENSORS, 2022, 22 (19)
  • [44] Detection of redundant traffic in large-scale communication networks based on logistic regression
    Wen X.
    Huang L.
    Zheng Y.
    Zhao H.
    International Journal of Reasoning-based Intelligent Systems, 2024, 16 (01) : 8 - 15
  • [45] In-Network Computation for Large-Scale Federated Learning Over Wireless Edge Networks
    Dinh, Thinh Quang
    Nguyen, Diep N.
    Hoang, Dinh Thai
    Pham, Tran Vu
    Dutkiewicz, Eryk
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (10) : 5918 - 5932
  • [46] Edge detection using orientation-independent operators in large-scale sensor networks
    Seo, Kyungryong
    Lee, Soo-Young
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 123 - +
  • [47] RAP: A real-time communication architecture for large-scale wireless sensor networks
    Lu, CY
    Blum, BM
    Abdelzaher, TF
    Stankovic, JA
    He, T
    EIGHTH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2002, : 55 - 66
  • [48] Analytical modelling and optimization analysis of large-scale communication systems and networks with repairmen policy
    Yonal Kirsal
    Computing, 2018, 100 : 503 - 527
  • [49] A Game-Theoretic Perspective on Resource Management for Large-Scale UAV Communication Networks
    Jiaxin Chen
    Ping Chen
    Qihui Wu
    Yuhua Xu
    Nan Qi
    Tao Fang
    中国通信, 2021, 18 (01) : 70 - 87
  • [50] Analytical modelling and optimization analysis of large-scale communication systems and networks with repairmen policy
    Kirsal, Yonal
    COMPUTING, 2018, 100 (05) : 503 - 527