{"id":"https://openalex.org/W6888506704","doi":"https://doi.org/10.21227/a8m1-x573","title":"Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis","display_name":"Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis","publication_year":2022,"publication_date":"2022-09-24","ids":{"openalex":"https://openalex.org/W6888506704","doi":"https://doi.org/10.21227/a8m1-x573"},"language":"en","primary_location":{"id":"doi:10.21227/a8m1-x573","is_oa":true,"landing_page_url":"https://doi.org/10.21227/a8m1-x573","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/a8m1-x573","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shandilya, Shishir Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shandilya, Shishir Kumar","raw_affiliation_strings":["VIT Bhopal University, India"],"affiliations":[{"raw_affiliation_string":"VIT Bhopal University, India","institution_ids":["https://openalex.org/I464993"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ganguli, Chirag","orcid":null},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ganguli, Chirag","raw_affiliation_strings":["VIT Bhopal University, India"],"affiliations":[{"raw_affiliation_string":"VIT Bhopal University, India","institution_ids":["https://openalex.org/I464993"]}]},{"author_position":"last","author":{"id":null,"display_name":"Izonin, Ivan","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Izonin, Ivan","raw_affiliation_strings":["Lviv Polytechnic National University, Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I464993"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10278","display_name":"Electric Motor Design and Analysis","score":0.9384999871253967,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10278","display_name":"Electric Motor Design and Analysis","score":0.9384999871253967,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10504","display_name":"Sensorless Control of Electric Motors","score":0.025699999183416367,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11602","display_name":"Magnetic Bearings and Levitation Dynamics","score":0.00800000037997961,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5995000004768372},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5892999768257141},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5584999918937683},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5515999794006348},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5115000009536743},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.49779999256134033},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.4805000126361847},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.4722000062465668},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.4456999897956848},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4302000105381012},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.41440001130104065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7297000288963318},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5995000004768372},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5892999768257141},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5584999918937683},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5515999794006348},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5293999910354614},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5115000009536743},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.49779999256134033},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.4805000126361847},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.4722000062465668},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4456999897956848},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4302000105381012},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.41440001130104065},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.40139999985694885},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.3928999900817871},{"id":"https://openalex.org/C2776599810","wikidata":"https://www.wikidata.org/wiki/Q4418000","display_name":"Network address","level":2,"score":0.39239999651908875},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.36980000138282776},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.36899998784065247},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.3447999954223633},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.34060001373291016},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3346000015735626},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3328999876976013},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.3278999924659729},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.323199987411499},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3179999887943268},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.30070000886917114},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.2992999851703644},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.29100000858306885},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C70236469","wikidata":"https://www.wikidata.org/wiki/Q1078262","display_name":"Database administrator","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C194147245","wikidata":"https://www.wikidata.org/wiki/Q1076368","display_name":"Chord (peer-to-peer)","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.275299996137619},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.2709999978542328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/a8m1-x573","is_oa":true,"landing_page_url":"https://doi.org/10.21227/a8m1-x573","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/a8m1-x573","is_oa":true,"landing_page_url":"https://doi.org/10.21227/a8m1-x573","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"score":0.5671103000640869,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"To":[0,79],"determine":[1],"the":[2,42,64,68,81,115,140,166,180,189,207,241,263,269],"effectiveness":[3],"of":[4,44,71,83,93,142,161,218,265],"any":[5],"defense":[6,56],"mechanism,":[7],"there":[8],"is":[9,186],"a":[10,59,91,102,151],"need":[11],"for":[12],"comprehensive":[13],"real-time":[14],"network":[15,39,69],"data":[16,40],"that":[17,106],"solely":[18],"references":[19],"various":[20,259],"attack":[21,86,134,156,213,255],"scenarios":[22,256],"based":[23,53],"on":[24,51,54,58,99,158,179,183,199,268],"older":[25,159],"software":[26],"versions":[27,160],"or":[28],"unprotected":[29],"ports,":[30],"and":[31,77,108,117,128,144,168,194,229,233,236,246,251,262],"so":[32],"on.":[33],"This":[34,171],"presented":[35,137],"dataset":[36,89,138,172],"has":[37],"entire":[38,270],"at":[41],"time":[43],"several":[45,84,133],"cyber":[46,85],"attacks":[47],"to":[48,97,147,150,165,188,191,243],"enable":[49],"experimentation":[50],"challenges":[52],"implementing":[55],"mechanisms":[57,261],"larger":[60],"scale.":[61],"For":[62],"collecting":[63],"data,":[65],"we":[66],"captured":[67],"traffic":[70],"configured":[72],"virtual":[73],"machines":[74],"using":[75,132],"Wireshark":[76],"tcpdump.":[78],"analyze":[80],"impact":[82,264],"scenarios,":[87],"this":[88,200],"presents":[90],"set":[92],"ten":[94,210],"computers":[95],"connected":[96,187],"Router1":[98],"VLAN1":[100,190],"in":[101],"Docker":[103],"Bridge":[104],"network,":[105],"try":[107],"exploit":[109],"each":[110],"other.":[111],"It":[112],"includes":[113,174],"browsing":[114],"web":[116,201],"downloading":[118],"foreign":[119],"packages":[120,162],"including":[121],"malicious":[122],"ones.":[123,170],"Also,":[124],"services":[125,198,242],"like":[126],"FTP":[127],"SSH":[129],"were":[130,203],"exploited":[131,205],"mechanisms.":[135],"The":[136,197,212,254],"shows":[139],"importance":[141],"updating":[143],"patching":[145],"systems":[146],"protect":[148],"themselves":[149],"greater":[152],"extent,":[153],"by":[154,206],"following":[155],"tactics":[157],"as":[163],"compared":[164],"newer":[167],"updated":[169],"also":[173,204,257],"an":[175],"Apache":[176],"Server":[177],"hosted":[178],"different":[181],"subset":[182],"VLAN2":[184],"which":[185],"demonstrate":[192],"isolation":[193],"cross-VLAN":[195],"communication.":[196],"server":[202],"previously":[208],"stated":[209],"computers.":[211],"types":[214],"include:":[215],"Distributed":[216],"Denial":[217],"Service,":[219],"SQL":[220],"Injection,":[221],"Account":[222],"Takeover,":[223],"Service":[224],"Exploitation":[225],"(SSH,":[226],"FTP),":[227],"DNS":[228],"ARP":[230],"Spoofing,":[231],"Scanning":[232],"Firewall":[234],"Searching":[235],"Indexing":[237],"(using":[238],"Nmap),":[239],"Hammering":[240],"brute-force":[244],"passwords":[245],"usernames,":[247],"Malware":[248],"attack,":[249],"Spoofing":[250],"Man-in-the-Middle":[252],"Attack.":[253],"show":[258],"scanning":[260],"Insider":[266],"Threats":[267],"network.":[271]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
