Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset

The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Information and Communication Systems (Online) S. 1 - 5
Hauptverfasser: Al-Haija, Qasem Abu, Masoud, Zaid, Yasin, Assim, Alesawi, Karam, Alkarnawi, Yousef
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 13.08.2024
Schlagworte:
ISSN:2573-3346
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
AbstractList The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created a huge concern regarding the security of systems connected to a network. Since huge amounts of data are traveling through worldwide networks, many threats have become a priority to consider. Traditional network security uses rule-based methods to detect abnormalities, and these methods struggle to survive with the evolving malicious activities that are becoming increasingly advanced. In this paper, we develop a new threat-hunting model for communication networks and introduce a novel, cutting-edge, large-scale multiclass dataset to improve the security of network cognition of suspicious traffic in networks. This paper dives into effective data collection and preprocessing methods to ensure a high learning curve for intelligent models, especially those trained on fine data. The proposed newly generated dataset contains up-to-date samples and features available to the public to help reduce the effect of upcoming cyberattacks with machine learning methods. Specifically, 6 million traffic samples with 60 features are collected and organized into two balanced classes: 50% normal traffic and 50% anomaly (attack) traffic. Furthermore, the anomaly traffic is composed of 15 different attacks including MITM-ARP-SPOOFING attack, SSH-BRUTE FORCE attack, FTP-BRUTE FORCE attack, DDOS-ICMP, DDOS-RAWIP attack, DDOS-UDP attack, DOS attack, EXPLOITING-FTP attack, FUZZING attack, ICMP FLOOD attack, SYN-FLOOD attack, PORT SCANNING attack, REMOTE CODE EXECUTION attack, SQL INJECTION attack, and XSS attack. This paper is expected to contribute positively to the security of networks. We will work on automating the detection of any suspicious traffic to empower the security of networks in worldwide organizations.
Author Al-Haija, Qasem Abu
Yasin, Assim
Alkarnawi, Yousef
Masoud, Zaid
Alesawi, Karam
Author_xml – sequence: 1
  givenname: Qasem Abu
  surname: Al-Haija
  fullname: Al-Haija, Qasem Abu
  organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan
– sequence: 2
  givenname: Zaid
  surname: Masoud
  fullname: Masoud, Zaid
  organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan
– sequence: 3
  givenname: Assim
  surname: Yasin
  fullname: Yasin, Assim
  organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan
– sequence: 4
  givenname: Karam
  surname: Alesawi
  fullname: Alesawi, Karam
  organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan
– sequence: 5
  givenname: Yousef
  surname: Alkarnawi
  fullname: Alkarnawi, Yousef
  organization: Princess Sumaya University for Technology,Department of Cybersecurity,Amman,Jordan
BookMark eNo1kEtOwzAYhA0CiVJ6Axa-QIpfsR12KBQaKYBEy7pynD_BkDoodkBweogAzWI00jezmFN05HsPCGFKlpSS7KLIi3wjudByyQgTS0ok10yrA7TIVKY5p6kgSpJDNGOp4gnnQp6gRQgvhBDOCBdCzVB4hPe-G6PrvftyvsXb5wFMxOvRxyk6j_N-vx-9s2aC8D3Ej354DZe48HHo69FOmMH5GKdCsqpbwKUZWkg21nSA78YuOtuZEPC1iSZAPEPHjekCLP58jp5uVtt8nZQPt0V-VSaOKhkTrn-UNqzWjChbNwoq1nCobKYVMZmlumIpT62paS2kErqRGamAgUot0brhc3T-u-sAYPc2uL0ZPnf_P_Fv0CVg3g
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICICS63486.2024.10638287
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798331540760
EISSN 2573-3346
EndPage 5
ExternalDocumentID 10638287
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i176t-383835f2d8207cdf7eb2f3ebc9870a9c18b2535cad1d46748f690be2e75c088f3
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001304560400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:33:07 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i176t-383835f2d8207cdf7eb2f3ebc9870a9c18b2535cad1d46748f690be2e75c088f3
PageCount 5
ParticipantIDs ieee_primary_10638287
PublicationCentury 2000
PublicationDate 2024-Aug.-13
PublicationDateYYYYMMDD 2024-08-13
PublicationDate_xml – month: 08
  year: 2024
  text: 2024-Aug.-13
  day: 13
PublicationDecade 2020
PublicationTitle International Conference on Information and Communication Systems (Online)
PublicationTitleAbbrev ICICS
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003203447
Score 1.8789518
Snippet The rapid advancements in digital technologies are revolutionizing our world, bringing forth new possibilities and opportunities every second. This has created...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Cybersecurity
Data collection
Data Engineering
Force
Fuzzing
Intrusion Detection/Classification
Machine learning
Network security
Organizations
Packet Analyzer
SQL injection
Virtualization
Title Revolutionizing Threat Hunting in Communication Networks: Introducing a Cutting-Edge Large-Scale Multiclass Dataset
URI https://ieeexplore.ieee.org/document/10638287
WOSCitedRecordID wos001304560400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6EePCkRozv9OC1uNvuq15XCCSEEEHDjfQx1b0sBnY5-Ottu4Dh4MFb07TJptPZefT7ZhB6NHHApDCaZFynJIKAkyyWklDDZChiw7V_aH8fpeNxNp_zyZas7rkwAODBZ9B1Q_-Wr5eqdqkyq-H2tlgXv4VaaZo0ZK19QoVRX71uh9YJ-NMwH-bThEWZgyLQqLvbftBIxduR_uk_v-AMdX4ZeXiytzXn6AjKC7R-hc325hTfdhrPPp0LiAdN-wdclPiA_4HHDeZ7_YyHDqCua-WWCZzXHv1MevoD8Mhhw8nUyg6wp-cq52DjF1FZg1d10Fu_N8sHZNtEgRRhmlTERqDWyTJUW1OfKm1SG0obBlJxq6mCqzCTNGaxEjrUvvOIsfGyBApprOwfyLBL1C6XJVwhzKUCI10BNatZhlIpEgiiUKgogESp6Bp13Iktvpo6GYvdYd38MX-LTpxcXIY2ZHeoXa1quEfHalMV69WDl-4P7nGoVA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagIMEEiCLeeGB1SRznxRpaNSJEFS2oWxXbZ8jSojbpwK_HdtqiDgxslmVZkc-Xe_j77hC6V77j8UJJEsUyJAycmEQ-54Qqj7uFr2JpH9rfszDPo_E4HqzI6pYLAwAWfAYdM7Rv-XImapMq0xqub4t28XfRns8YdRq61ial4lFbv26N13HihzRJk2HgsciAESjrrDfYaqViLUnv6J_fcIzav5w8PNhYmxO0A9NTtHiF5erulN96Go8-jROI-00DCFxO8RYDBOcN6nvxiFMDUZe1MMsKnNQW_0y68gNwZtDhZKilB9gSdIVxsfFTUWmTV7XRW687Svpk1UaBlG4YVETHoNrNUlRqYx8KqUIdTCsPuIi1rhaxcCNOfc8XhXSl7T2idMTMgULoC_0PUt4Zak1nUzhHOOYCFDcl1LRuKUp5EYDD3EIwBwIh2AVqmxObfDWVMibrw7r8Y_4OHfRHL9kkS_PnK3RoZGTyta53jVrVvIYbtC-WVbmY31pJ_wDbvKub
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Information+and+Communication+Systems+%28Online%29&rft.atitle=Revolutionizing+Threat+Hunting+in+Communication+Networks%3A+Introducing+a+Cutting-Edge+Large-Scale+Multiclass+Dataset&rft.au=Al-Haija%2C+Qasem+Abu&rft.au=Masoud%2C+Zaid&rft.au=Yasin%2C+Assim&rft.au=Alesawi%2C+Karam&rft.date=2024-08-13&rft.pub=IEEE&rft.eissn=2573-3346&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICS63486.2024.10638287&rft.externalDocID=10638287