Serial Number: 43
Year: 2016
Kind of Traffic: Simulated
Publicly Available: Yes
Count of Records: 374661 records
Features Count: 23
No. of citations: 378
Attack Type: Flooding etc
Download Links: https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds
Abstract: Almomani and colleagues developed a dataset, which encompasses both attack and normal -related network traffic to assess the effectiveness of an Intrusion Detection System (IDS) designed for Wireless Sensor Networks (WSNs). The scientists employed the network simulator NS-2 to model a network that includes numerous wireless sensor devices implementing the LEACH (Low Energy Aware Cluster Hierarchy) protocol, which is a hierarchical MAC (Medium Access Control) protocol specifically, designed for Wireless Sensor Networks (WSNs). Each node observed the communication of five adjacent nodes and sent a report to the central sink during the data collection phase throughout the entire Wireless Sensor Network (WSN). To simulate malicious situations, four categories of Distributed Denial of Service (DDoS) attacks were introduced. Grey-hole, black hole, flooding, and scheduling attacks. A malicious node selectively drops traffic from its neighbours in Grey-hole attack, in black-hole attack a malicious node collects and discards all traffic from its neighbours, in scheduling attack the attacker configures the network to prompt simultaneous transmissions from all devices and flooding attack entails sending a significant volume of routing messages to disturb the network. The entire dataset consists of 374,661-labelled records, from which 23 features were derived. These features include the quantity of received and sent packets, node ID, and topological details regarding the WSN (Wireless Sensor Network).