Full description
In this dataset, we have generated several classical network based attack and save as pcap file. Based on that pcap file, we have mutated that traffic to generate adverarial attack. After creating adverarial attack, we have extracted several network feature using four extractor (i) CICFlowmeter (ii) NFStreamer (iii) NTLFLowLyzer (iv) zeek. List of classical Attacks and tools Brute force Attack --> Tools: FTP-Patator,SSH-Patator, FTP-Hydra,SSH-Hydra,FTP-Metasploit,SSH-Metasploit DoS Attack --> Tools: Slowloris, LOIC-UDP,LOIC-TCP,Heartleech Web Attack(XSS Attack) -->Tools: PWNXSS Web Attack (Brute Force) --> Tools : Hydra Web Attack (Brute Force) ---> Tools: Burp Suite Web Attack (DoS) ---> Tools: Slowhttptest,GoldenEye,Hulk,LOIC Web Attack (SQL Injection) ---> Tools: SQLmap Infiltration Attack (PortScan) ---> Tools: nmapAuto, Hping3 Botnet Attack ---> Tools: Ares Botnet DDoS ---> Tools: Hpingp3 Used Operating System (I) Linux (II) Kali LinuxCreated: 2024-06-01 to 2024-06-01
Issued: 2024-06-01
User Contributed Tags
Login to tag this record with meaningful keywords to make it easier to discover
Identifiers
- global : 29c6ce4d-ca6e-4906-9c42-94f0498c3d28