Skip to content
Snippets Groups Projects
Commit 12618b0b authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update 2 files

- /images/image-5.png
- /README.md
parent a3b2cc4b
No related branches found
No related tags found
No related merge requests found
......@@ -5,6 +5,13 @@
The Graph-Based Dataset for IoT Network Attack Detection is a curated collection of data specifically designed for research and development in the field of cybersecurity, focusing on the detection of attacks in Internet of Things (IoT) networks. This graph-based dataset provides researchers, developers, and practitioners with a comprehensive resource to evaluate and benchmark various detection algorithms and systems in real-world IoT network environments.
## Key Features
- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
## Dataset Description
The dataset consists of network traffic data captured from emulated IoT network environments, where various attack scenarios have been emulated. The network traffic data is represented in the form of graphs, capturing the interactions and relationships between different devices, services, and communication patterns within the IoT network. Each graph in the dataset represents a snapshot of network activity over a specific time period, enabling analysis of attack patterns and behaviors. The following figure presents the general netwok architecture.
......@@ -33,7 +40,12 @@ As for the attack scenarios, we used a botnet composed of multiple VMs controlle
## 3. Data capture
To capture the network trafic in our environment, we used Wireshark tool to record the network data in pcap format and used a flow capture tool called CICFlowmeter.
![Alt text](image.png)
### Packet
we use the Wireshark tool to record the network data in pcap format. They are available in the GRASEC-IoT gitlab \cite{grasec}. An exemple of features:
<div align="center">
<img src="images/image-5.png" alt="alt text" width="500" />
</div>
## Graph modeling
......@@ -41,13 +53,6 @@ To capture the network trafic in our environment, we used Wireshark tool to reco
<img src="images/image.png" alt="alt text" width="500" />
</div>
## Key Features
- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
## Dataset Access
The GRASEC-IoT Dataset is available for download and exploration via this gitlab.
......@@ -68,3 +73,4 @@ Creative Commons Attribution. CC BY 4.0 Deed Attribution 4.0 International.
## Project status
Current
images/image-5.png

195 KiB

0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment