2018
DOI: 10.4236/jis.2018.94016
|View full text |Cite
|
Sign up to set email alerts
|

Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation

Abstract: Distributed Denial of Service (DDoS) attacks are performed from multiple agents towards a single victim. Essentially, all attacking agents generate multiple packets towards the victim to overwhelm it with requests, thereby overloading the resources of the victim. Since it is very complex and expensive to conduct a real DDoS attack, most organizations and researchers result in using simulations to mimic an actual attack. The researchers come up with diverse algorithms and mechanisms for attack detection and pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…Several researchers used OMNeT++ to simulate different types of DDoS attacks in traditional networks. [56][57][58] In this work, we generated normal and DDoS traffic for VANET scenarios. For the normal traffic, each node (vehicle or RSU) broadcasts UDP packets with a transmission interval of 1-5 per second.…”
Section: Overview Of Proposed Workmentioning
confidence: 99%
“…Several researchers used OMNeT++ to simulate different types of DDoS attacks in traditional networks. [56][57][58] In this work, we generated normal and DDoS traffic for VANET scenarios. For the normal traffic, each node (vehicle or RSU) broadcasts UDP packets with a transmission interval of 1-5 per second.…”
Section: Overview Of Proposed Workmentioning
confidence: 99%
“…As it is very difficult to identify a suitable dataset for a specific type of DDoS attack, most researchers either use existing datasets or create their own dataset. The major limitation of using an existing dataset that it is very old and so not applicable for testing a system's robustness [109], [110]. It is known that attacks such as DDoS attacks adapt advanced techniques and become more sophisticated in order to circumvent any security measures, which means that it is not good practice to rely on results based on old datasets.…”
Section: A Datasetmentioning
confidence: 99%
“…Similarly, in other benchmarks, there are only a limited number of DDoS attacks. 50,51 On the other hand, it is known that many other types of DDoS attacks exist and are produced in the course of time. 51,52 The present work therefore aims to fill this gap by analyzing a rich set of DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%