A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing

Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and...

Full description

Bibliographic Details
Main Authors: Aparna Tomar, Preeti Mishra, Rahul Bisht, Peddoju Sateesh Kumar
Format: Article
Language:English
Published: Ram Arti Publishers 2022-02-01
Series:International Journal of Mathematical, Engineering and Management Sciences
Subjects:
Online Access:https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdf
_version_ 1811271372029034496
author Aparna Tomar
Preeti Mishra
Rahul Bisht
Peddoju Sateesh Kumar
author_facet Aparna Tomar
Preeti Mishra
Rahul Bisht
Peddoju Sateesh Kumar
author_sort Aparna Tomar
collection DOAJ
description Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and DDoS attack datasets have been generated using realistic testbed environments as older datasets have their own set of limitations, making them insufficient for today’s computing. An architectural framework is provided to depict the process of packet capturing and feature extraction. A total of 45 features are extracted using Flowtbag among which 17 best features are selected using the average correlation coefficient. Six machine learning algorithms namely Logistic Regression (LR), Naïve Bayes (NB), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM) are applied on datasets with full features and selected features to obtain accuracy, precision, recall, and F1 score. NB gave the lowest accuracy of 0.94917 on full features and DT provided the most accurate results with a performance matrix of 0.99254 accuracy, 0.997 precision, 0.998 recall, and 0.997 F1 Score. Whereas on selected features, accuracies of both the algorithms increased to 0.962434 and 0.992703 respectively.
first_indexed 2024-04-12T22:20:01Z
format Article
id doaj.art-c87f8f3ba5834c42a8e1058473b8b1ad
institution Directory Open Access Journal
issn 2455-7749
language English
last_indexed 2024-04-12T22:20:01Z
publishDate 2022-02-01
publisher Ram Arti Publishers
record_format Article
series International Journal of Mathematical, Engineering and Management Sciences
spelling doaj.art-c87f8f3ba5834c42a8e1058473b8b1ad2022-12-22T03:14:24ZengRam Arti PublishersInternational Journal of Mathematical, Engineering and Management Sciences2455-77492022-02-0171819110.33889/IJMEMS.2022.7.1.006A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric ComputingAparna Tomar0Preeti Mishra1Rahul Bisht2Peddoju Sateesh Kumar3Department of Computer Science and Engineering, Graphic Era University, Dehradun, India.Department of Computer Science, Doon University, Dehradun, India.Department of Computer Science and Engineering, Graphic Era University, Dehradun, India.Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, India.Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are the common ones. In this paper, DoS and DDoS attack datasets have been generated using realistic testbed environments as older datasets have their own set of limitations, making them insufficient for today’s computing. An architectural framework is provided to depict the process of packet capturing and feature extraction. A total of 45 features are extracted using Flowtbag among which 17 best features are selected using the average correlation coefficient. Six machine learning algorithms namely Logistic Regression (LR), Naïve Bayes (NB), K-Nearest Neighbors (KNN), Decision Tree (DT), Random Forest (RF), and Support Vector Machine (SVM) are applied on datasets with full features and selected features to obtain accuracy, precision, recall, and F1 score. NB gave the lowest accuracy of 0.94917 on full features and DT provided the most accurate results with a performance matrix of 0.99254 accuracy, 0.997 precision, 0.998 recall, and 0.997 F1 Score. Whereas on selected features, accuracies of both the algorithms increased to 0.962434 and 0.992703 respectively.https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdfdockerdocker securitydocker swarmdataset generationdos/ddos
spellingShingle Aparna Tomar
Preeti Mishra
Rahul Bisht
Peddoju Sateesh Kumar
A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
International Journal of Mathematical, Engineering and Management Sciences
docker
docker security
docker swarm
dataset generation
dos/ddos
title A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
title_full A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
title_fullStr A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
title_full_unstemmed A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
title_short A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
title_sort step towards generation of dos ddos attacks dataset for docker centric computing
topic docker
docker security
docker swarm
dataset generation
dos/ddos
url https://ijmems.in/cms/storage/app/public/uploads/volumes/6-IJMEMS-21-0537-7-1-81-91-2022.pdf
work_keys_str_mv AT aparnatomar asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT preetimishra asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT rahulbisht asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT peddojusateeshkumar asteptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT aparnatomar steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT preetimishra steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT rahulbisht steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing
AT peddojusateeshkumar steptowardsgenerationofdosddosattacksdatasetfordockercentriccomputing