SDN-DDOS-TCP-SYN DATASET

Published: 11 March 2021| Version 1 | DOI: 10.17632/8nb4cdwc9h.1
Contributors:
Karan Gupta,
,

Description

The dataset has been created by performing TCP-SYN Flood attack. The Dataset contains 28 columns and 10,47,500 rows.

Files

Steps to reproduce

Step 1: Using mininet emulator we first created network topology with 25 hosts and simultaneously used RYU controller. Step 2: Created malicious packets script with the help of Python Scapy Framework using ip spoofing. Step 3: Initialized TCP server on the victim node. Step 4: Executed the python script on the attacker node. Step 5:Simultaneously captured the tcp syn packets using Wireshark. Step 6:Exported the pcap file to csv file using tshark.

Institutions

Shri Mata Vaishno Devi University

Categories

Denial-of-Service Attack, Software Defined Network

Licence