Erhan Derya, Anarım Emin
Boğaziçi University Electrical and Electronics Engineering, İstanbul, Turkey.
Data Brief. 2020 Aug 17;32:106187. doi: 10.1016/j.dib.2020.106187. eCollection 2020 Oct.
Distributed Denial of Service (DDoS) attacks is one of the most troublesome intrusions for online services on the internet. In general DDoS attacks are divided into two categories as bandwidth depletion and resource depletion attacks. We generate resource depletion-type DDoS attacks on the campus network of Boğaziçi University and recorded the ongoing traffic from the backbone router's mirrored port. We generate TCP SYN, and UDP flooding packets using Hping3 traffic generator software by flooding. This dataset includes attack-free user traffic and attack traffic, which is suitable for evaluating network-based DDoS detection methods. Attacks are towards one victim server connected to the backbone router of the campus. Attack packets have randomly generated spoofed source IP addresses. We removed payloads of packets and anonymized the source IP addresses of legitimate users for the confidentiality of legitimate users.
分布式拒绝服务(DDoS)攻击是互联网上在线服务面临的最麻烦的入侵之一。一般来说,DDoS攻击分为带宽耗尽和资源耗尽两类。我们在博阿齐奇大学的校园网络上发起资源耗尽型DDoS攻击,并记录骨干路由器镜像端口的实时流量。我们使用Hping3流量生成器软件通过泛洪生成TCP SYN和UDP泛洪数据包。该数据集包括无攻击的用户流量和攻击流量,适用于评估基于网络的DDoS检测方法。攻击针对连接到校园骨干路由器的一台受害服务器。攻击数据包具有随机生成的伪造源IP地址。为了保护合法用户的隐私,我们删除了数据包的有效载荷,并对合法用户的源IP地址进行了匿名处理。