Congratulations!  You have been automatically subscribed to IEEE DataPort and can access all datasets on IEEE DataPort!

First Name: 
Muhammad Zunnurain
Last Name: 
Hussain

Datasets & Competitions

A Wormhole attack in a dataset, where certain nodes (wormhole nodes) create an illusion of having a shorter path in network communications to attract traffic, the dataset will reflect network traffic patterns altered by these deceptive links. Here’s the structure for 95,000 records:

Categories:
324 Views

a Sinkhole attack in a dataset, we'll generate data that typically reflects network traffic and interactions, where some nodes act as sinkholes by attracting all or most of the traffic due to malicious intent. Here's how I'll structure the dataset for 80,000 records:

Categories:
303 Views

a dataset with 50,000 records simulating a Sybil attack scenario. Here's the plan for each record in the dataset:

Categories:
341 Views