Data

Network packet mutation dataset for adversarial attack

Charles Sturt University
Hasan, MD Mehedi
Viewed: [[ro.stat.viewed]] Cited: [[ro.stat.cited]] Accessed: [[ro.stat.accessed]]
ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rfr_id=info%3Asid%2FANDS&rft_id=https://researchoutput.csu.edu.au/en/datasets/29c6ce4d-ca6e-4906-9c42-94f0498c3d28&rft.title=Network packet mutation dataset for adversarial attack&rft.identifier=29c6ce4d-ca6e-4906-9c42-94f0498c3d28&rft.publisher=Charles Sturt University&rft.description=In this dataset, we have generated several classical network based attack and save as pcap file. Based on that pcap file, we have mutated that traffic to generate adverarial attack. After creating adverarial attack, we have extracted several network feature using four extractor (i) CICFlowmeter (ii) NFStreamer (iii) NTLFLowLyzer (iv) zeek. List of classical Attacks and tools Brute force Attack --> Tools: FTP-Patator,SSH-Patator, FTP-Hydra,SSH-Hydra,FTP-Metasploit,SSH-Metasploit DoS Attack --> Tools: Slowloris, LOIC-UDP,LOIC-TCP,Heartleech Web Attack(XSS Attack) -->Tools: PWNXSS Web Attack (Brute Force) --> Tools : Hydra Web Attack (Brute Force) ---> Tools: Burp Suite Web Attack (DoS) ---> Tools: Slowhttptest,GoldenEye,Hulk,LOIC Web Attack (SQL Injection) ---> Tools: SQLmap Infiltration Attack (PortScan) ---> Tools: nmapAuto, Hping3 Botnet Attack ---> Tools: Ares Botnet DDoS ---> Tools: Hpingp3 Used Operating System (I) Linux (II) Kali Linux &rft.creator=Hasan, MD Mehedi &rft.date=2024&rft_rights=Licences for items within this collection vary. See individual items for the licences that apply to them.&rft.type=dataset&rft.language=English Access the data

Licence & Rights:

Other view details
Unknown

Licences for items within this collection vary. See individual items for the licences that apply to them.

Access:

Open

Full description

In this dataset, we have generated several classical network based attack and save as pcap file. Based on that pcap file, we have mutated that traffic to generate adverarial attack. After creating adverarial attack, we have extracted several network feature using four extractor (i) CICFlowmeter (ii) NFStreamer (iii) NTLFLowLyzer (iv) zeek. List of classical Attacks and tools Brute force Attack --> Tools: FTP-Patator,SSH-Patator, FTP-Hydra,SSH-Hydra,FTP-Metasploit,SSH-Metasploit DoS Attack --> Tools: Slowloris, LOIC-UDP,LOIC-TCP,Heartleech Web Attack(XSS Attack) -->Tools: PWNXSS Web Attack (Brute Force) --> Tools : Hydra Web Attack (Brute Force) ---> Tools: Burp Suite Web Attack (DoS) ---> Tools: Slowhttptest,GoldenEye,Hulk,LOIC Web Attack (SQL Injection) ---> Tools: SQLmap Infiltration Attack (PortScan) ---> Tools: nmapAuto, Hping3 Botnet Attack ---> Tools: Ares Botnet DDoS ---> Tools: Hpingp3 Used Operating System (I) Linux (II) Kali Linux

Created: 2024-06-01 to 2024-06-01

Issued: 2024-06-01

This dataset is part of a larger collection

Click to explore relationships graph

User Contributed Tags    

Login to tag this record with meaningful keywords to make it easier to discover

Identifiers
  • global : 29c6ce4d-ca6e-4906-9c42-94f0498c3d28