Description of Data
In this dataset, we have generated several classical network based attack and save as pcap file. Based on that pcap file, we have mutated that traffic to generate adverarial attack. After creating adverarial attack, we have extracted several network feature using four extractor (i) CICFlowmeter (ii) NFStreamer (iii) NTLFLowLyzer (iv) zeek.
List of classical Attacks and tools
Brute force Attack --> Tools: FTP-Patator,SSH-Patator, FTP-Hydra,SSH-Hydra,FTP-Metasploit,SSH-Metasploit
DoS Attack --> Tools: Slowloris, LOIC-UDP,LOIC-TCP,Heartleech
Web Attack(XSS Attack) -->Tools: PWNXSS
Web Attack (Brute Force) --> Tools : Hydra
Web Attack (Brute Force) ---> Tools: Burp Suite
Web Attack (DoS) ---> Tools: Slowhttptest,GoldenEye,Hulk,LOIC
Web Attack (SQL Injection) ---> Tools: SQLmap
Infiltration Attack (PortScan) ---> Tools: nmapAuto, Hping3
Botnet Attack ---> Tools: Ares Botnet
DDoS ---> Tools: Hpingp3
Used Operating System
(I) Linux
(II) Kali Linux
List of classical Attacks and tools
Brute force Attack --> Tools: FTP-Patator,SSH-Patator, FTP-Hydra,SSH-Hydra,FTP-Metasploit,SSH-Metasploit
DoS Attack --> Tools: Slowloris, LOIC-UDP,LOIC-TCP,Heartleech
Web Attack(XSS Attack) -->Tools: PWNXSS
Web Attack (Brute Force) --> Tools : Hydra
Web Attack (Brute Force) ---> Tools: Burp Suite
Web Attack (DoS) ---> Tools: Slowhttptest,GoldenEye,Hulk,LOIC
Web Attack (SQL Injection) ---> Tools: SQLmap
Infiltration Attack (PortScan) ---> Tools: nmapAuto, Hping3
Botnet Attack ---> Tools: Ares Botnet
DDoS ---> Tools: Hpingp3
Used Operating System
(I) Linux
(II) Kali Linux
Date made available | 01 Jun 2024 |
---|---|
Publisher | Charles Sturt University |
Date of data production | 01 Jun 2024 |