Sybil Attack Simulation Dataset

Citation Author(s):
Muhammad Zunnurain
Hussain
Bahria University Lahore Campus
Muhammad Zulkifl
Hasan
University of Central Punjab
Submitted by:
Muhammad Zunnur...
Last updated:
Tue, 04/16/2024 - 01:42
DOI:
10.21227/89w8-bf69
Data Format:
License:
263 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

a dataset with 50,000 records simulating a Sybil attack scenario. Here's the plan for each record in the dataset:

  1. ID: A unique sequential number.
  2. Timestamp: Randomized date and time.
  3. User_ID: Randomly assigned, with a pattern to simulate normal and Sybil identities.
  4. Action_Type: Randomly chosen from a predefined list of actions like login, transaction, comment, etc.
  5. Is_Sybil: Randomly assigned with a bias towards normal interactions but with a significant portion flagged as Sybil actions to simulate an attack.
  6. IP_Address: Randomly generated, with Sybil actions often sharing IPs to reflect the nature of the attack.

Comments

Researchers doing research on Sybil Attack can get benefit from this dataset.

Submitted by Muhammad Zunnur... on Tue, 04/16/2024 - 01:43