SDN-DDOS-TCP-SYN DATASET
Published: 11 March 2021| Version 1 | DOI: 10.17632/8nb4cdwc9h.1
Contributors:
Karan Gupta, , Description
The dataset has been created by performing TCP-SYN Flood attack. The Dataset contains 28 columns and 10,47,500 rows.
Files
Steps to reproduce
Step 1: Using mininet emulator we first created network topology with 25 hosts and simultaneously used RYU controller. Step 2: Created malicious packets script with the help of Python Scapy Framework using ip spoofing. Step 3: Initialized TCP server on the victim node. Step 4: Executed the python script on the attacker node. Step 5:Simultaneously captured the tcp syn packets using Wireshark. Step 6:Exported the pcap file to csv file using tshark.
Institutions
Shri Mata Vaishno Devi University
Categories
Denial-of-Service Attack, Software Defined Network