Sybil Attack Simulation Dataset

Citation Author(s):
Muhammad Zunnurain
Hussain
Bahria University Lahore Campus
Muhammad Zulkifl
Hasan
University of Central Punjab
Submitted by:
Muhammad Zunnur...
Last updated:
Tue, 04/16/2024 - 01:42
DOI:
10.21227/89w8-bf69
Data Format:
License:
114 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

a dataset with 50,000 records simulating a Sybil attack scenario. Here's the plan for each record in the dataset:

  1. ID: A unique sequential number.
  2. Timestamp: Randomized date and time.
  3. User_ID: Randomly assigned, with a pattern to simulate normal and Sybil identities.
  4. Action_Type: Randomly chosen from a predefined list of actions like login, transaction, comment, etc.
  5. Is_Sybil: Randomly assigned with a bias towards normal interactions but with a significant portion flagged as Sybil actions to simulate an attack.
  6. IP_Address: Randomly generated, with Sybil actions often sharing IPs to reflect the nature of the attack.
Instructions: 

The dataset is csv file

Comments

Researchers doing research on Sybil Attack can get benefit from this dataset.

Submitted by Muhammad Zunnur... on Tue, 04/16/2024 - 01:43