2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT) 2022
DOI: 10.1109/bdcat56447.2022.00015
|View full text |Cite
|
Sign up to set email alerts
|

Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets

Abstract: Adapting modern approaches for network intrusion detection is becoming critical, given the rapid technological advancement and adversarial attack rates. Therefore, packetbased methods utilizing payload data are gaining much popularity due to their effectiveness in detecting certain attacks. However, packet-based approaches suffer from a lack of standardization, resulting in incomparability and reproducibility issues. Unlike flow-based datasets, no standard labeled dataset exists, forcing researchers to follow … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…To handle this, we used Payload-Byte to extract and label the PCAP files of the two NIDS datasets mentioned above. 15 This tool takes raw PCAP data and parses the data into bytes and packet header features. Bytes that do not reach the default size of 1500 are padded with zeros.…”
Section: Datamentioning
confidence: 99%
See 1 more Smart Citation
“…To handle this, we used Payload-Byte to extract and label the PCAP files of the two NIDS datasets mentioned above. 15 This tool takes raw PCAP data and parses the data into bytes and packet header features. Bytes that do not reach the default size of 1500 are padded with zeros.…”
Section: Datamentioning
confidence: 99%
“…The other features included are time-to-live, protocol, and time between packets. 15 As such, we are able to consider both packet and flow information in this work.…”
Section: Datamentioning
confidence: 99%
“…The research in [37] and [9] influences our work, introducing a method for converting network traffic packets into images. By expending this innovative approach, we utilize a single DL model that autonomously learns features, resulting in significant time savings.…”
Section: Related Workmentioning
confidence: 99%
“…To address this challenge, researchers propose innovative techniques. For instance, in [38], [37], [9], the authors introduce novel methods to convert packets from PCAP files into images to use data representation techniques from the computer vision field for malware traffic classification. Similarly, NLP techniques are employed to extract features from textual descriptions like log files, as demonstrated in [19], [10], [12], [20].…”
Section: Related Workmentioning
confidence: 99%
“…Recognizing the growing need for standardized approaches in modern network intrusion detection datasets, Farrukh et al (2022) introduced Payload-Byte. This versatile tool streamlines dataset curation and establishes a standardized foundation for future research.…”
Section: Salo Et Al Introduce a Hybrid Dimensionality Reduction Techn...mentioning
confidence: 99%