Published October 7, 2024 | Version v3
Dataset Open

NCSRD-DS-5GDDoS: 5G Radio and Core metrics containing sporadic DDoS attacks

Description

NCSRD-DS-5GDDos v3.0 Dataset
===
NCSRD-DS-5GDDos is a comprehensive dataset recorded in a real-world 5G testbed that aligns with the 3GPP specifications. The dataset captures Distributed Denial of Service (DDoS) attacks initiated by malicious connected users (UEs). 

The setup comprises of 3 cells with a total of 9 UEs connected to the same core network. The 5G network is implemented by the Amarisoft Callbox Mini solution (cell 2), and we further employ a second cell using the Amarisoft Classic (cell 1 & 3), that also hosts the 5G core.

The setup utilizes a broad set of UE devices comprising a set of smart phones (Huawei P40), microcomputers (Raspberry Pi 4 - Waveshare 5G Hat M2), industrial 5G routers (Industrial Waveshare 5G Router), a WiFi-6 mobile hotspot (DWR-2101 5G Wi-Fi 6 Mobile Hotspot) and a CPE box (Waveshare 5G CPE Box). All UEs are being operated by subsidiary hosts which are responsible for the traffic generation, occurring from scheduled communications times.

All identifiers are artificially generated and do not represent or based on personal data. We identify each UE through its ‘imeisv’ ID, that corresponds to the device in use, due to vendor implementation, that uses the same IMSI for all UEs.

This dataset captures attack data from a total of 5 malicious User Equipment (UE) devices that initiated various flooding attacks on a 5G network. Each record includes key identifiers such as the IMEISV (International Mobile Equipment Identity Software Version number) and IP address of the attacking UE, along with the device type. The file "summary_report.csv" summarizes this information. The traffic types used in the attacks include syn flooding, UDP flooding, ICMP flooding, DNS flooding, and GTP-U flooding. The benign users stream YouTube and Skype traffic.

The dataset is recorded through the use of a data collector that interfaces with the 5G network and gathers data regarding UEs, gNBs and the Core Network. The data are recorded in an InfluxdB and pre-processed into three separate tabular .csv files for more efficient processing: “amari_ue_data.csv”, “enb_counters.csv” and “mme_counters.csv”. In this version, we use an Amarisoft Classic (cells 1 & 3, Core Network) and an Amarisoft Mini (cell 2) (more information on the products can be found in https://www.amarisoft.com/).

The ”amari_ue_data.csv” provides information on the UEs regarding identification (“imeisv”, “5g_tmsi”, “rnti”), IP addressing, bearer information, cell information (“tac”, “ran_plmn”), and cell information (“ul_bitrate”, “dl_bitrate”, “cell_id”, retransmissions per user per cell “ul_retx” as well as aggregated bit rates for each cell).

The ”enb_counters.csv” focuses on cell-level information, providing downlink and uplink bitrates, usage ratio per user, cpu load of the gNB.

We provide separate files of ”amari_ue_data.csv” and ”enb_counters.csv” generated from each gNB (Amarisoft Classic and Mini).

The “mme_counters.csv” provides information on the Non-Access Stratum (NAS) of the 5G Network and focuses on session status reports (e.g., number of PDU session establishments, paging, context setup. This part gives an overview of the connection management throughout the recording session, and provides information on features suggested by 3GPP for abnormal user behavior.

We also provide a separate pre-processed dataset, that merges the two "amari_ue_data_*.csv" file, including labeling of the malicious/benign samples, and may be more flexible for interested data scientists.

Please refer to README.txt for the features included in each file.

If you use this dataset, please also cite the following papers:

M. Christopoulou, A. Garos, A. Vekraki, D. Santorinaios, I. Koufos, S. Karamitsiani, G. Xilouris, M.-A. Kourtis, G. Gardikis, and P. Trakadas, “User Terminals as Attackers: An Open Dataset Analysis of DDoS Attacks in 5G Networks,” in Proc. 2024 IEEE Conf. Standards Commun. Netw. (CSCN), 2024, pp. 301–307, doi: 10.1109/CSCN63874.2024.10849694.

G. Xylouris, A. Vekraki, M. Christopoulou, M. A. Kourtis, E. K. Markakis and P. Trakadas, "Advancing Predictive Security for Consumer Applications in Beyond 5G/6G Networks With Annotated Datasets," in IEEE Transactions on Consumer Electronics, doi: 10.1109/TCE.2025.3567151.

Files

amari_ue_data_classic_tabular.csv

Files (619.9 MB)

Name Size Download all
md5:55d538dbda1a2726b0b341d418331cd4
143.6 MB Preview Download
md5:a50e22bd98ed3779de986469889bfd0f
241.5 MB Preview Download
md5:cbf5df5bff44102a51bfc3a38f06bb86
87.3 MB Preview Download
md5:0e5f774131c4e73e3b42604a62f2a65d
72.2 MB Preview Download
md5:2addd89fc3a57fa4cedbc3125403a990
38.2 MB Preview Download
md5:e69e2b75eb82512a857adfdb4c982fd2
37.1 MB Preview Download
md5:5df490488f70bbb246e57c5cde3eb2d1
9.8 kB Preview Download
md5:87a093cb2794f13fa72559bfb5b14331
18.0 kB Download

Additional details

Funding

European Commission
PRIVATEER - Privacy-first Security Enablers for 6G Networks 101096110