Sinkhole Attack Simulation Dataset

Citation Author(s):
Muhammad Zunnurain
Hussain
Bahria University Lahore Campus
Muhammad Zulkifl
Hasan
University of Central Punjab
Submitted by:
Muhammad Zunnur...
Last updated:
Tue, 04/16/2024 - 01:48
DOI:
10.21227/wg5s-ra72
Data Format:
License:
169 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

a Sinkhole attack in a dataset, we'll generate data that typically reflects network traffic and interactions, where some nodes act as sinkholes by attracting all or most of the traffic due to malicious intent. Here's how I'll structure the dataset for 80,000 records:

  1. ID: Unique identifier for each interaction.
  2. Timestamp: Randomized date and time.
  3. Source_IP: IP address of the source node.
  4. Destination_IP: IP address of the destination node, with some IPs recurrently appearing in a sinkhole pattern.
  5. Packet_Size: Size of the packet sent from source to destination.
  6. Action: Type of action (e.g., data_request, data_transfer).
  7. Is_Sinkhole: Indicates if the action was towards a sinkhole node (True or False).
Instructions: 

The dataste is in csv format and help researchers doing research in security domain.