Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset
The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks...
Uloženo v:
| Vydáno v: | International Conference on Information and Communication Systems (Online) s. 1 - 5 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
13.08.2024
|
| Témata: | |
| ISSN: | 2573-3346 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations. |
|---|---|
| AbstractList | The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations. |
| Author | Al-Haija, Qasem Abu Yasin, Assim Alkarnawi, Yousef Masoud, Zaid Alesawi, Karam |
| Author_xml | – sequence: 1 givenname: Qasem Abu surname: Al-Haija fullname: Al-Haija, Qasem Abu organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan – sequence: 2 givenname: Zaid surname: Masoud fullname: Masoud, Zaid organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan – sequence: 3 givenname: Assim surname: Yasin fullname: Yasin, Assim organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan – sequence: 4 givenname: Karam surname: Alesawi fullname: Alesawi, Karam organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan – sequence: 5 givenname: Yousef surname: Alkarnawi fullname: Alkarnawi, Yousef organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan |
| BookMark | eNo1kEtOwzAYhA0CiVJ6Axa-QIpfsR12KBQaKYBEy7pynD_BkDoodkBweogAzWI00jezmFN05HsPCGFKlpSS7KLIi3wjudByyQgTS0ok10yrA7TIVKY5p6kgSpJDNGOp4gnnQp6gRQgvhBDOCBdCzVB4hPe-G6PrvftyvsXb5wFMxOvRxyk6j_N-vx-9s2aC8D3Ej354DZe48HHo69FOmMH5GKdCsqpbwKUZWkg21nSA78YuOtuZEPC1iSZAPEPHjekCLP58jp5uVtt8nZQPt0V-VSaOKhkTrn-UNqzWjChbNwoq1nCobKYVMZmlumIpT62paS2kErqRGamAgUot0brhc3T-u-sAYPc2uL0ZPnf_P_Fv0CVg3g |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICICS63486.2024.10638287 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798331540760 |
| EISSN | 2573-3346 |
| EndPage | 5 |
| ExternalDocumentID | 10638287 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i176t-383835f2d8207cdf7eb2f3ebc9870a9c18b2535cad1d46748f690be2e75c088f3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001304560400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:33:07 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i176t-383835f2d8207cdf7eb2f3ebc9870a9c18b2535cad1d46748f690be2e75c088f3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10638287 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-Aug.-13 |
| PublicationDateYYYYMMDD | 2024-08-13 |
| PublicationDate_xml | – month: 08 year: 2024 text: 2024-Aug.-13 day: 13 |
| PublicationDecade | 2020 |
| PublicationTitle | International Conference on Information and Communication Systems (Online) |
| PublicationTitleAbbrev | ICICS |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003203447 |
| Score | 1.8789518 |
| Snippet | The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Cybersecurity Data collection Data Engineering Force Fuzzing Intrusion Detection/Classification Machine learning Network security Organizations Packet Analyzer SQL injection Virtualization |
| Title | Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset |
| URI | https://ieeexplore.ieee.org/document/10638287 |
| WOSCitedRecordID | wos001304560400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxcAEiCK-5YHVpbGTOGYNrRqpqipaULcq_oIsKWqTDvx6zk5b1IGBLbISyfLZuXfn9-4QesxlzgXvSdJTEKKESgZEJDYioXTumMdK-l4E7yM-HifzuZhsxepeC2OM8eQz03WP_i5fL1XtUmVwwmG3AMRvoRbncSPW2idUGPXV63ZsnZ54ytIsncYsTBwVgYbd3ecHjVS8Hxmc_nMGZ6jzq8jDk72vOUdHprxA61ez2e6c4huG8ezTQUA8bNo_4KLEB_oPPG443-tnnDmCuq6Vey3Hae3Zz6SvPwweOW44mYLtDPbyXOUANn7JK3B4VQe9DfqzdEi2TRRIEfC4IhCBAsiyVIOr50pbDqG0ZUYqASc1FypIJI1YpHIdaN95xEK8LA01PFLwB7LsErXLZWmuEJY0jLWgEGABaomsTULAB65-umRcMaavUcet2OKrqZOx2C3WzR_jt-jE2cVlaAN2h9rVqjb36FhtqmK9evDW_QEipqaI |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELWgIMEEiCK-8cDq0sROnLCGVo0IUUUL6lbFH4EsKWqTDvx6zk5b1IGBLbKiyPLZuXfn9-4Qus9ExkPeFaQrIURhUjgkDHKPMGHcMfelsL0I3hOepsFkEg5XYnWrhdFaW_KZ7phHe5evZrI2qTI44bBbAOLvoj2PMbfbyLU2KRXq2vp1a75ON3yIozga-ZQFhozgss76A1utVKwn6R_9cw7HqP2rycPDjbc5QTu6PEWLV71c7Z3iG4bx-NOAQDxoGkDgosRbChCcNqzvxSOODUVd1dK8luGotvxn0lMfGieGHU5GYD2NrUBXGoiNn7IKXF7VRm_93jgakFUbBVI43K8IxKAAs3JXgbPnUuUcgumcaiFDOKtZKJ1AuB71ZKYcZXuP5BAxC-1q7kn4B-X0DLXKWanPERYu81XoQogFuMXL84ABQjAV1AXlklJ1gdpmxaZfTaWM6XqxLv8Yv0MHg_FLMk3i9PkKHRobmXytQ69Rq5rX-gbty2VVLOa31tI_-R6pzw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Information+and+Communication+Systems+%28Online%29&rft.atitle=Revolutionizing+Threat+Hunting+in+Communication+Networks%3A+Introducing+a+Cutting-Edge+Large-Scale+Multiclass+Dataset&rft.au=Al-Haija%2C+Qasem+Abu&rft.au=Masoud%2C+Zaid&rft.au=Yasin%2C+Assim&rft.au=Alesawi%2C+Karam&rft.date=2024-08-13&rft.pub=IEEE&rft.eissn=2573-3346&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICS63486.2024.10638287&rft.externalDocID=10638287 |