Sybil Attack Simulation Dataset

Citation Author(s):
Muhammad Zunnurain
Hussain
Bahria University Lahore Campus
Muhammad Zulkifl
Hasan
University of Central Punjab
Submitted by:
Muhammad Zunnur...
Last updated:
Tue, 04/16/2024 - 01:42
DOI:
10.21227/89w8-bf69
Data Format:
License:
426 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

a dataset with 50,000 records simulating a Sybil attack scenario. Here's the plan for each record in the dataset:

  1. ID: A unique sequential number.
  2. Timestamp: Randomized date and time.
  3. User_ID: Randomly assigned, with a pattern to simulate normal and Sybil identities.
  4. Action_Type: Randomly chosen from a predefined list of actions like login, transaction, comment, etc.
  5. Is_Sybil: Randomly assigned with a bias towards normal interactions but with a significant portion flagged as Sybil actions to simulate an attack.
  6. IP_Address: Randomly generated, with Sybil actions often sharing IPs to reflect the nature of the attack.
Instructions: 

The dataset is csv file

Comments

Researchers doing research on Sybil Attack can get benefit from this dataset.

Submitted by Muhammad Zunnur... on Tue, 04/16/2024 - 01:43

I would be glad to use this dataset for my research, as I believe it will significantly contribute to my study on sybil attack. The dataset’s relevance and quality will help in conducting a thorough analysis and deriving meaningful insights.

Please let me know if there are any specific terms or conditions for its use. I appreciate your support and look forward to your response.

Best regards,

 

Submitted by Shafi'i Abdulhamid on Sun, 02/09/2025 - 08:55