Wormhole Attack Simulation Dataset

Citation Author(s):
Muhammad Zunnurain
Hussain
Bahria University Lahore Campus
Muhammad Zulkifl
Hasan
University of Central Punjab
Submitted by:
Muhammad Zunnur...
Last updated:
Tue, 04/16/2024 - 01:52
DOI:
10.21227/da7k-dr50
License:
324 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

A Wormhole attack in a dataset, where certain nodes (wormhole nodes) create an illusion of having a shorter path in network communications to attract traffic, the dataset will reflect network traffic patterns altered by these deceptive links. Here’s the structure for 95,000 records:

  1. ID: Unique identifier for each packet or interaction.
  2. Timestamp: Randomized date and time.
  3. Source_IP: IP address of the source node.
  4. Destination_IP: IP address of the destination node.
  5. Packet_Size: Size of the packet sent from source to destination.
  6. Action: Type of action (e.g., data_request, data_transfer).
  7. Is_Wormhole: Indicates if the interaction involved a wormhole node (True or False).
Instructions: 

The dataset is for the researchers who are doing research in the security domain

Comments

none

Submitted by Michael Masele on Fri, 04/26/2024 - 11:20