2021
DOI: 10.3390/app11177868
|View full text |Cite
|
Sign up to set email alerts
|

Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic

Abstract: The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains encrypted synthetic attacks and benign traffic. This dataset conforms to two requirements: the content requirements, which focus on the produced dataset, and the process requirements, which focus on how the dataset is built. We compile these requirements to enable future dataset developments and we make the HIKARI-2021 dataset, al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(25 citation statements)
references
References 52 publications
0
25
0
Order By: Relevance
“… Brute-Force Web: attacks that aim at cracking vulnerable computer networks that depend on weak user credentials, which consist of weak usernames and passwords [11,20,21].…”
Section: A Network Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“… Brute-Force Web: attacks that aim at cracking vulnerable computer networks that depend on weak user credentials, which consist of weak usernames and passwords [11,20,21].…”
Section: A Network Attacksmentioning
confidence: 99%
“… Distributed Denial of Service (DDoS): attacks designed to target network or web servers with limited bandwidth by overwhelming them with requests from tens or hundreds of distributed URL addresses [11,22,23]. DDOS LOIC-UDP stands for Distributed Denial of Service (DDoS) Low Orbit Ion Cannon (LOIC) Datagram Protocol (UDP).…”
Section: A Network Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Ferriyan et al [14] developed several machine learning models for detecting cyberattacks, and used a new dataset called ALLFLOWMETER HIKARI2021. Background, Benign, Bruteforce, Bruteforce-XML, Probing, and XMRIGCC CryptoMiner are the six types of attacks represented among the 555,278 instances and 86 features extracted by Zeek [https://zeek.org/] in this dataset.…”
Section: Related Workmentioning
confidence: 99%