A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ram Arti Publishers
2022-02-01
|
Series: | International Journal of Mathematical, Engineering and Management Sciences |
Subjects: | |
Online Access: | https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdf |
_version_ | 1811271372029034496 |
---|---|
author | Aparna Tomar Preeti Mishra Rahul Bisht Peddoju Sateesh Kumar |
author_facet | Aparna Tomar Preeti Mishra Rahul Bisht Peddoju Sateesh Kumar |
author_sort | Aparna Tomar |
collection | DOAJ |
description | Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and DDoS attack datasets have been generated using realistic testbed environments as older datasets have their own set of limitations, making them insufficient for today’s computing. An architectural framework is provided to depict the process of packet capturing and feature extraction. A total of 45 features are extracted using Flowtbag among which 17 best features are selected using the average correlation coefficient. Six machine learning algorithms namely Logistic Regression (LR), Naïve Bayes (NB), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM) are applied on datasets with full features and selected features to obtain accuracy, precision, recall, and F1 score. NB gave the lowest accuracy of 0.94917 on full features and DT provided the most accurate results with a performance matrix of 0.99254 accuracy, 0.997 precision, 0.998 recall, and 0.997 F1 Score. Whereas on selected features, accuracies of both the algorithms increased to 0.962434 and 0.992703 respectively. |
first_indexed | 2024-04-12T22:20:01Z |
format | Article |
id | doaj.art-c87f8f3ba5834c42a8e1058473b8b1ad |
institution | Directory Open Access Journal |
issn | 2455-7749 |
language | English |
last_indexed | 2024-04-12T22:20:01Z |
publishDate | 2022-02-01 |
publisher | Ram Arti Publishers |
record_format | Article |
series | International Journal of Mathematical, Engineering and Management Sciences |
spelling | doaj.art-c87f8f3ba5834c42a8e1058473b8b1ad2022-12-22T03:14:24ZengRam Arti PublishersInternational Journal of Mathematical, Engineering and Management Sciences2455-77492022-02-0171819110.33889/IJMEMS.2022.7.1.006A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric ComputingAparna Tomar0Preeti Mishra1Rahul Bisht2Peddoju Sateesh Kumar3Department of Computer Science and Engineering, Graphic Era University, Dehradun, India.Department of Computer Science, Doon University, Dehradun, India.Department of Computer Science and Engineering, Graphic Era University, Dehradun, India.Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, India.Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and DDoS attack datasets have been generated using realistic testbed environments as older datasets have their own set of limitations, making them insufficient for today’s computing. An architectural framework is provided to depict the process of packet capturing and feature extraction. A total of 45 features are extracted using Flowtbag among which 17 best features are selected using the average correlation coefficient. Six machine learning algorithms namely Logistic Regression (LR), Naïve Bayes (NB), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM) are applied on datasets with full features and selected features to obtain accuracy, precision, recall, and F1 score. NB gave the lowest accuracy of 0.94917 on full features and DT provided the most accurate results with a performance matrix of 0.99254 accuracy, 0.997 precision, 0.998 recall, and 0.997 F1 Score. Whereas on selected features, accuracies of both the algorithms increased to 0.962434 and 0.992703 respectively.https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdfdockerdocker securitydocker swarmdataset generationdos/ddos |
spellingShingle | Aparna Tomar Preeti Mishra Rahul Bisht Peddoju Sateesh Kumar A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing International Journal of Mathematical, Engineering and Management Sciences docker docker security docker swarm dataset generation dos/ddos |
title | A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing |
title_full | A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing |
title_fullStr | A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing |
title_full_unstemmed | A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing |
title_short | A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing |
title_sort | step towards generation of dos ddos attacks dataset for docker centric computing |
topic | docker docker security docker swarm dataset generation dos/ddos |
url | https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdf |
work_keys_str_mv | AT aparnatomar asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT preetimishra asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT rahulbisht asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT peddojusateeshkumar asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT aparnatomar steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT preetimishra steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT rahulbisht steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing AT peddojusateeshkumar steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing |