Dataset Restricted Access

# TCP FIN Flood and Zbassocflood Dataset

Stiawan, Deris; Wahyudi, Dimas; Heryanto, Ahmad; Septian, Tri Wanda; Wahyudi, Johan; Andika, Riki; Suryani, Meilinda Eka

### Citation Style Language JSON Export

{
"publisher": "Zenodo",
"DOI": "10.5281/zenodo.4431541",
"language": "eng",
"title": "TCP FIN Flood and Zbassocflood Dataset",
"issued": {
"date-parts": [
[
2018,
12,
11
]
]
},
"abstract": "<p><strong>The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data.</strong></p>\n\n<p>Abstract&mdash; This research focuses on the requirements for and the creation of an intrusion detection system (IDS) dataset for an Internet of Things (IoT) network domain.</p>\n\n<p>A minimal requirements Internet of Things (IoT) network system was built to produce a dataset according to IDS testing needs for IoT security. Testing was performed with 12 scenarios and resulted in 24 datasets which consisted of normal, attack and combined normal-attack traffic data. Testing focused on three denial of service (DoS) and distributed denial of service (DDoS) attacks&mdash;&ldquo;finish&rdquo; (FIN) flood, User Datagram Protocol (UDP) flood, and Zbassocflood/association flood&mdash;using two communication protocols, IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee). A preprocessing test result obtained 95 attributes for the WiFi datasets and 64 attributes for the Xbee datasets .</p>\n\n<p><strong>TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis</strong></p>\n\n<p>Abstract-Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenarios normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The results of the confusion matrix detection rate evaluation against the snort as IDS show the average percentage of the precision level.</p>\n\n<p>Citing<br>\nCitation data : &quot;TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis&quot; - <a href=\"https://online-journals.org/index.php/i-joe/article/view/9848\">https://online-journals.org/index.php/i-joe/article/view/9848</a></p>\n\n<pre><code>@article{article,\n\nauthor = {Stiawan, Deris and Wahyudi, Dimas and Heryanto, Ahmad and Sahmin, Samsuryadi and Idris, Yazid and Muchtar, Farkhana and Alzahrani, Mohammed and Budiarto, Rahmat},\n\nyear = {2019},\nmonth = {04},\npages = {124},\ntitle = {TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis},\nvolume = {15},\njournal = {International Journal of Online and Biomedical Engineering (iJOE)},\ndoi = {10.3991/ijoe.v15i07.9848}\n}</code></pre>\n\n<p><strong>Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)</strong></p>\n\n<p>Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.</p>\n\n<p>Citing<br>\nCitation data : &quot;Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)&quot; - <a href=\"https://ieeexplore.ieee.org/document/9251292\">https://ieeexplore.ieee.org/document/9251292</a></p>\n\n<pre><code>@inproceedings{inproceedings,\n\nauthor = {Sharipuddin, and Purnama, Benni and Kurniabudi, Kurniabudi and Winanto, Eko and Stiawan, Deris and Hanapi, Darmawiiovo and Idris, Mohd and Budiarto, Rahmat},\n\nyear = {2020},\nmonth = {10},\npages = {114-118},\ntitle = {Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)},\ndoi = {10.23919/EECSI50503.2020.9251292}\n}</code></pre>\n\n<p>&nbsp;</p>",
"author": [
{
"family": "Stiawan, Deris"
},
{
"family": "Wahyudi, Dimas"
},
{
},
{
"family": "Septian, Tri Wanda"
},
{
"family": "Wahyudi, Johan"
},
{
"family": "Andika, Riki"
},
{
"family": "Suryani, Meilinda Eka"
}
],
"version": "1",
"type": "dataset",
"id": "4431541"
}
154
8
views