Dataset Details: WSN-DS

Dataset Information

Serial Number: 43

Year: 2016

Kind of Traffic: Simulated

Publicly Available: Yes

Count of Records: 374661 records

Features Count: 23

CITE

No. of citations: 378

Attack Type: Flooding etc

Download Links: https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds

Abstract: Almomani and colleagues developed a dataset, which encompasses both attack and normal -related network traffic to assess the effectiveness of an Intrusion Detection System (IDS) designed for Wireless Sensor Networks (WSNs). The scientists employed the network simulator NS-2 to model a network that includes numerous wireless sensor devices implementing the LEACH (Low Energy Aware Cluster Hierarchy) protocol, which is a hierarchical MAC (Medium Access Control) protocol specifically, designed for Wireless Sensor Networks (WSNs). Each node observed the communication of five adjacent nodes and sent a report to the central sink during the data collection phase throughout the entire Wireless Sensor Network (WSN). To simulate malicious situations, four categories of Distributed Denial of Service (DDoS) attacks were introduced. Grey-hole, black hole, flooding, and scheduling attacks. A malicious node selectively drops traffic from its neighbours in Grey-hole attack, in black-hole attack a malicious node collects and discards all traffic from its neighbours, in scheduling attack the attacker configures the network to prompt simultaneous transmissions from all devices and flooding attack entails sending a significant volume of routing messages to disturb the network. The entire dataset consists of 374,661-labelled records, from which 23 features were derived. These features include the quantity of received and sent packets, node ID, and topological details regarding the WSN (Wireless Sensor Network).

Back to Datasets