• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

博阿齐奇大学分布式拒绝服务数据集。

Boğaziçi University distributed denial of service dataset.

作者信息

Erhan Derya, Anarım Emin

机构信息

Boğaziçi University Electrical and Electronics Engineering, İstanbul, Turkey.

出版信息

Data Brief. 2020 Aug 17;32:106187. doi: 10.1016/j.dib.2020.106187. eCollection 2020 Oct.

DOI:10.1016/j.dib.2020.106187
PMID:32904236
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7452651/
Abstract

Distributed Denial of Service (DDoS) attacks is one of the most troublesome intrusions for online services on the internet. In general DDoS attacks are divided into two categories as bandwidth depletion and resource depletion attacks. We generate resource depletion-type DDoS attacks on the campus network of Boğaziçi University and recorded the ongoing traffic from the backbone router's mirrored port. We generate TCP SYN, and UDP flooding packets using Hping3 traffic generator software by flooding. This dataset includes attack-free user traffic and attack traffic, which is suitable for evaluating network-based DDoS detection methods. Attacks are towards one victim server connected to the backbone router of the campus. Attack packets have randomly generated spoofed source IP addresses. We removed payloads of packets and anonymized the source IP addresses of legitimate users for the confidentiality of legitimate users.

摘要

分布式拒绝服务(DDoS)攻击是互联网上在线服务面临的最麻烦的入侵之一。一般来说,DDoS攻击分为带宽耗尽和资源耗尽两类。我们在博阿齐奇大学的校园网络上发起资源耗尽型DDoS攻击,并记录骨干路由器镜像端口的实时流量。我们使用Hping3流量生成器软件通过泛洪生成TCP SYN和UDP泛洪数据包。该数据集包括无攻击的用户流量和攻击流量,适用于评估基于网络的DDoS检测方法。攻击针对连接到校园骨干路由器的一台受害服务器。攻击数据包具有随机生成的伪造源IP地址。为了保护合法用户的隐私,我们删除了数据包的有效载荷,并对合法用户的源IP地址进行了匿名处理。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e52e/7452651/062eba653364/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e52e/7452651/062eba653364/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e52e/7452651/062eba653364/gr1.jpg

相似文献

1
Boğaziçi University distributed denial of service dataset.博阿齐奇大学分布式拒绝服务数据集。
Data Brief. 2020 Aug 17;32:106187. doi: 10.1016/j.dib.2020.106187. eCollection 2020 Oct.
2
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks.RAPT:一种减轻SYN泛洪分布式拒绝服务网络攻击的稳健攻击路径追踪算法。
Sensors (Basel). 2022 Dec 22;23(1):102. doi: 10.3390/s23010102.
3
DDoS Flood and Destination Service Changing Sensor.DDoS 泛洪与目标服务变换传感器。
Sensors (Basel). 2021 Mar 11;21(6):1980. doi: 10.3390/s21061980.
4
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.SSK-DDoS:基于分布式流处理框架的DDoS攻击分类系统
Cluster Comput. 2022;25(2):1355-1372. doi: 10.1007/s10586-022-03538-x. Epub 2022 Jan 17.
5
MFFLR-DDoS: An encrypted LR-DDoS attack detection method based on multi-granularity feature fusions in SDN.MFFLR-DDoS:一种基于软件定义网络中多粒度特征融合的加密LR-DDoS攻击检测方法。
Math Biosci Eng. 2024 Feb 26;21(3):4187-4209. doi: 10.3934/mbe.2024185.
6
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
7
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN.HLD-DDoSDN:基于高低速率数据集的针对 SDN 的 DDoS 攻击。
PLoS One. 2024 Feb 8;19(2):e0297548. doi: 10.1371/journal.pone.0297548. eCollection 2024.
8
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.基于深度学习算法的网络流量分布式拒绝服务攻击检测
Sensors (Basel). 2023 Oct 23;23(20):8642. doi: 10.3390/s23208642.
9
A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.基于网络的IP欺骗分布式拒绝服务攻击及恶意软件感染系统的高效检测研究。
Springerplus. 2016 Oct 26;5(1):1878. doi: 10.1186/s40064-016-3569-3. eCollection 2016.
10
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.

引用本文的文献

1
HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer.HiViT-IDS:一种基于视觉Transformer的高效网络入侵检测方法。
Sensors (Basel). 2025 Mar 12;25(6):1752. doi: 10.3390/s25061752.