skip to main content
10.1145/3407023.3407042acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A case study on the representativeness of public DoS network traffic data for cybersecurity research

Authors Info & Claims
Published:25 August 2020Publication History

ABSTRACT

The availability of ready-to-use public security datasets is fostering measurement-driven research by a wide community of academics and practitioners. Recent trends in this area put forth a substantial body of literature on anomaly and attack detection on the top of public labelled datasets. Much of this literature blindly reuses existing datasets by overlooking the cybersecurity facets of the network traffic therein, in terms of its real impact on service availability and performance of operations.

This paper addresses the representativeness of network traffic data provided by public datasets for cybersecurity research. To this aim, it proposes an initial exploration of the topic by means of a case study on Denial of Service (DoS) traffic of CICIDS2017, which is a recent dataset collected in a controlled environment that gained massive attention over the past two years. DoS traffic, which is available in CICIDS2017 in the form of packet data files, is replayed against a victim server in a controlled testbed. Measurements indicate that the DoS traffic, although somewhat relevant at network-level, has limited impact at application-level (i.e., by taking into account the performance of the victim under attack). The findings provide some key insights into the limitations of the data assessed in the study, paving the way for the construction of more rigorous datasets conceived with a multilayer perspective and that reflect actual traffic conditions under normative operations and disruptive attacks.

References

  1. 1999. KDD Cup Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.htmlGoogle ScholarGoogle Scholar
  2. A. Ahmim, L. A. Maglaras, M. A. Ferrag, M. Derdour, and H. Janicke. 2019. A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models. In International Conference on Distributed Computing in Sensor Systems. IEEE, 228--233.Google ScholarGoogle Scholar
  3. D. Aksu and M. Ali Aydin. 2018. Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms. In International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism. IEEE, 77--80.Google ScholarGoogle Scholar
  4. M. Alizadeh, A. Greenberg, D. A. Maltz, J. Padhye, P. Patel, B. Prabhakar, S. Sengupta, and M. Sridharan. 2010. Data center TCP (DCTCP). ACM SIGCOMM Comput. Commun. Rev. 40, 4 (2010), 63--74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Catillo, M. Rak, and U. Villano. 2019. Discovery of DoS attacks by the ZED-IDS anomaly detector. Journal of High Speed Networks 25 (2019), 349--365.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Catillo, M. Rak, and U. Villano. 2020. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In Web, Artificial Intelligence and Network Applications. WAINA2020. (Advances in Intelligent Systems and Computing), L. Barolli, F. Amato, F. Moscato, T. Enokido, and M. Takizawa (Eds.). Springer, Cham, 687--696.Google ScholarGoogle Scholar
  7. D. Cotroneo, A. Paudice, and A. Pecchia. 2019. Empirical Analysis and Validation of Security Alerts Filtering Techniques. IEEE Transactions on Dependable and Secure Computing 16, 5 (2019), 856--870.Google ScholarGoogle ScholarCross RefCross Ref
  8. F. S. de Lima Filho, F. A. F. Silveira, A. de Medeiros Brito Júnior, G. Vargas-Solar, and L. F. Silveira. 2019. Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. Security and Communication Networks 1574749 (2019), 1--15.Google ScholarGoogle ScholarCross RefCross Ref
  9. U. Franke and J. Brynielsson. 2014. Cyber situational awareness - A systematic review of the literature. Comput. Secur. 46 (2014), 18 -- 31.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Jain. 1991. The Art of Computer Systems Performance Analysis. J. Wiley & Sons New York.Google ScholarGoogle Scholar
  11. A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman. 2019. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2 (2019), 20.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. Kshirsagar and S. Kumar. 2020. Identifying Reduced Features Based on IG-Threshold for DoS Attack Detection Using PART. In Distributed Computing and Internet Technology, D. V. Hung and M. D'Souza (Eds.). Springer, Cham, 411--419.Google ScholarGoogle Scholar
  13. H. Liu and B. Lang. 2019. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Applied Sciences 9, 20 (2019), 4396.Google ScholarGoogle ScholarCross RefCross Ref
  14. G. Maciá-Fernández, J. Camacho, R. Magán-Carrión, P. García-Teodoro, and R. Therón. 2017. UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73 (2017), 411 -- 424.Google ScholarGoogle ScholarCross RefCross Ref
  15. G. Mantas, N. Stakhanova, H. Gonzalez, H. Jazi, and A. Ghorbani. 2015. Application-layer denial of service attacks: Taxonomy and survey. International Journal of Information and Computer Security 7 (2015), 216 -- 239.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Martins, J. M. Cruz, T. Cruz, and P. H. Abreu. 2019. Analyzing the Footprint of Classifiers in Adversarial Denial of Service Contexts. In Progress in Artificial Intelligence, P. M. Oliveira, P. Novais, and L. Reis (Eds.). Springer, Cham, 256--267.Google ScholarGoogle Scholar
  17. J. McHugh. 2000. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4 (2000), 262--294.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Moustafa and J. Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Military Communications and Information Systems Conference. IEEE, 1--6.Google ScholarGoogle Scholar
  19. R. Panigrahi and S. Borah. 2018. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology 7, 3.24 (2018).Google ScholarGoogle Scholar
  20. X. Peng, W. Huang, and Z. Shi. 2019. Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method. In International Conference on Tools with Artificial Intelligence. IEEE, 1288--1295.Google ScholarGoogle Scholar
  21. X. Qu, L. Yang, K. Guo, L. Ma, T. Feng, S. Ren, and M. Sun. 2019. Statistics-enhanced Direct Batch Growth Self-organizing Mapping for efficient DoS Attack Detection. IEEE Access 7 (2019), 78434--78441.Google ScholarGoogle ScholarCross RefCross Ref
  22. E. Raftopoulos and X. Dimitropoulos. 2013. Understanding Network Forensics Analysis in an Operational Environment. In Security and Privacy Workshops. IEEE, 111--118.Google ScholarGoogle Scholar
  23. M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho. 2019. A Survey of Network-based Intrusion Detection Data Sets. Comput. Secur. 86 (2019), 147--167.Google ScholarGoogle ScholarCross RefCross Ref
  24. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani. 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In International Conference on Information Systems Security and Privacy. SciTePress, 108--116.Google ScholarGoogle Scholar
  25. A. Sharma, Z. Kalbarczyk, J. Barlow, and R. Iyer. 2011. Analysis of security data from a large computing organization. In International Conference on Dependable Systems Networks. IEEE, 506--517.Google ScholarGoogle Scholar
  26. A. Shiravi, H. Shiravi, M. Tavallaee, and A. Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31 (2012), 357--374.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. T. Zargar, J. Joshi, and D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15 (2013), 2046 -- 2069.Google ScholarGoogle ScholarCross RefCross Ref
  28. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 1--6.Google ScholarGoogle Scholar
  29. S. Wankhede and D. Kshirsagar. 2018. DoS Attack Detection Using Machine Learning and Neural Network. In International Conference on Computing Communication Control and Automation. IEEE, 1--5.Google ScholarGoogle Scholar
  30. C. Wohlin, P. Runeson, M. Höst, M. C. Ohlsson, B. Regnell, and A. Wesslén. 2000. Experimentation in Software Engineering: An Introduction. Kluwer Academic.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A case study on the representativeness of public DoS network traffic data for cybersecurity research

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
        August 2020
        1073 pages
        ISBN:9781450388337
        DOI:10.1145/3407023
        • Program Chairs:
        • Melanie Volkamer,
        • Christian Wressnegger

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 August 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate228of451submissions,51%
      • Article Metrics

        • Downloads (Last 12 months)13
        • Downloads (Last 6 weeks)4

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader