Inicio  /  Information  /  Vol: 15 Par: 4 (2024)  /  Artículo
ARTÍCULO
TITULO

Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization

MohammadMoein Shafi    
Arash Habibi Lashkari    
Vicente Rodriguez and Ron Nevo    

Resumen

The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Additionally, the effectiveness of new detection methods depends heavily on well-constructed datasets. This paper addresses the critical DDoS dataset creation and evaluation domain, focusing on the cloud network. After conducting an in-depth analysis of 16 publicly available datasets, this research identifies 15 shortcomings across various dimensions, emphasizing the need for a new approach to dataset creation. Building upon this understanding, this paper introduces a new public DDoS dataset named BCCC-cPacket-Cloud-DDoS-2024. This dataset is meticulously crafted, addressing challenges identified in previous datasets through a cloud infrastructure featuring over eight benign user activities and 17 DDoS attack scenarios. Also, a Benign User Profiler (BUP) tool has been designed and developed to generate benign user network traffic based on a normal user behavior profile. We manually label the dataset and extract over 300 features from the network and transport layers of the traffic flows using NTLFlowLyzer. The experimental phase involves identifying an optimal feature set using three distinct algorithms: ANOVA, information gain, and extra tree. Finally, this paper proposes a multi-layered DDoS detection model and evaluates its performance using the generated dataset to cover the main issues of the traditional approaches.

 Artículos similares

       
 
Tracy L. Stepien, Cole Zmurchok, James B. Hengenius, Rocío Marilyn Caja Rivera, Maria R. D?Orsogna and Alan E. Lindsay    
Male and female moths communicate in complex ways to search for and to select a mate. In a process termed calling, females emit small quantities of pheromones, generating plumes that spread in the environment. Males detect the plume through their antenna... ver más
Revista: Applied Sciences

 
Chao Ou-Yang, Chandrawati Putri Wulandari, Mohammad Iqbal, Han-Cheng Wang and Chiehfeng Chen    
Today, patients generate a massive amount of health records through electronic health records (EHRs). Extracting usable knowledge of patients? pathological conditions or diagnoses is essential for the reasoning process in rule-based systems to support th... ver más
Revista: Applied Sciences

 
Leonardo Caggiani, Rosalia Camporeale, Michele Ottomanelli     Pág. 278 - 285
Recently, vehicle sharing emerged as a new type of mobility service. In particular, if these systems happen to be free-floating, their operating area is typically located within the city and vehicles could be picked-up and parked in any permitted spot, a... ver más

 
Cynthia L. Knott, G. Steube    
Increasing concerns about security and privacy have raised the bar for interest in ways to protect information. Although newer approaches include face recognition, the use of passwords is commonly used today as the best approach for protecting data. Web ... ver más