Skip to content
Snippets Groups Projects
Commit 07701aeb authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update 2 files

- /images/image-4.png
- /README.md
parent cb347018
No related branches found
No related tags found
No related merge requests found
......@@ -31,8 +31,9 @@ For normal traffic generation, we used multiple virtual machine that were suppos
## 2. Attack scenarios
As for the attack scenarios, we used a botnet composed of multiple VMs controlled by a Kali virtual machine. This botnet was able to launch a variety of network attacks on the local server described above. These attacks included the following: HTTP GET flood, HTTP POST flood, ICMP flood, TCP SYN flood, UDP flood, Port scanning and Brute force.
## 3. Data capture
To capture the network trafic in our environment, we used a flow capture tool called CICFlowmeter.
To capture the network trafic in our environment, we used Wireshark tool to record the network data in pcap format and used a flow capture tool called CICFlowmeter.
![Alt text](image.png)
## Graph modeling
......@@ -67,3 +68,22 @@ Creative Commons Attribution. CC BY 4.0 Deed Attribution 4.0 International.
## Project status
Current
\begin{table*}[!ht]
\resizebox{\textwidth}{!}{%
\begin{tabular}{l|c|c|c|c|c|c|}
\cline{2-7}
\multicolumn{1}{c|}{\textbf{}} & \textbf{\begin{tabular}[c]{@{}c@{}}Realistic network\\ environment\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Realistic network\\ traffic\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}IoT traffic\\ included\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Various attack\\ scenarios\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Network\\ Flows\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Labelled\\ data\end{tabular}} \\ \hline
\multicolumn{1}{|l|}{\textbf{DARPA98 \cite{lee1998data}} } & \checkmark & \xmark & F & T & F & T \\ \hline
\multicolumn{1}{|l|}{\textbf{KDD99 \cite{lee1998data}}} & \checkmark & \xmark & F & T & F & T \\ \hline
\multicolumn{1}{|l|}{\textbf{DEFCON \cite{sharafaldin2018toward}} } & F & F & F & T & F & F \\ \hline
\multicolumn{1}{|l|}{\textbf{LBNL \cite{sharafaldin2018toward}}} & F & T & F & T & F & F \\ \hline
\multicolumn{1}{|l|}{\textbf{CAIDA \cite{caida}}} & T & T & F & F & F & F \\ \hline
\multicolumn{1}{|l|}{\textbf{UNSW-NB15 \cite{moustafa2015unsw}}} & T & T & F & T & F & T \\ \hline
\multicolumn{1}{|l|}{\textbf{CIC-IDS2017 \cite{yulianto2019improving}}} & T & T & F & T & T & T \\ \hline
\multicolumn{1}{|l|}{\textbf{Bot-IoT \cite{koroniotis2019towards}}} & T & T & T* & T & F & T \\ \hline
\multicolumn{1}{|l|}{\textbf{TON-IoT \cite{moustafa2021new}} } & T & T & T** & T & F & T \\ \hline
\multicolumn{1}{|l|}{\textbf{GRASEC-IoT}} & T & T & T*** & T & T & T \\ \hline
\end{tabular}%
}
\end{table*}
\ No newline at end of file
images/image-4.png

195 KiB

0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment