Dataset: FLNET2023
FLNET2023 is a state-of-the-art benchmark dataset for intrusion detection systems, specifically for Federated Learning applications. Generated using the CORE emulator, it embodies a realistic network topology and a diverse range of traffic and attack types. FLNET2023 aims to encourage robust research in federated learning based network intrusion detection.
Common Open Research Emulator CORE is a tool for emulating networks on one or more machines. You can connect these emulated networks to live networks. CORE consists of a GUI for drawing topologies of lightweight virtual machines, and Python modules for scripting network emulation.
The dataset was generated based on the GEANT-2012 network topology, obtained from The Internet Topology Zoo. This real-world topology represents a large-scale network infrastructure similar to those in Internet Service Providers (ISPs), with 40 nodes each representing primary routers serving specific locations or functions. The topology was replicated within the Common Open Research Emulator (CORE), where network traffic data was collected from ten strategically selected router nodes, labeled as {D1, D2, D3, ..., D10}, you can see in figure below. These nodes cover different parts of the network and were chosen to provide a diverse and realistic data set.
FLNET2023 includes a broad mix of both normal and malicious network traffic, providing a realistic view of network interactions. The dataset spans over several kinds of common network protocols, like HTTP, TCP, UDP, and ICMP.
Attack | Duration | PPS | Size |
---|---|---|---|
Normal-D1 | 278.38 min | 6.23 pk/s | 257 MB |
Normal-D2 | 278.85 min | 5.41 pk/s | 222 MB |
Normal-D3 | 304.44 min | 10.68 pk/s | 46.4 MB |
Normal-D4 | 295.77 min | 2.17 pk/s | 305 MB |
Normal-D5 | 262.38 min | 8.06 pk/s | 225 MB |
Normal-D6 | 284.33 min | 12.16 pk/s | 388 MB |
Normal-D7 | 294.77 min | 19.02 pk/s | 665 MB |
Normal-D8 | 294.77 min | 13.43 pk/s | 507 MB |
Normal-D9 | 286.45 min | 8.08 pk/s | 464 MB |
Normal-D10 | 313.83 min | 23.71 pk/s | 1.23 GB |
DoS-hulk-D2 | 11.38 min | 576 pk/s | 8.2 GB |
DoS-hulk-D4 | 10.36 min | 622 pk/s | 8.4 GB |
DoS-hulk-D6 | 10 min | 674 pk/s | 8.5 GB |
DoS-hulk-D7 | 10 min | 375 pk/s | 4.6 GB |
DoS-hulk-D8 | 8.73 min | 376 pk/s | 4.6 GB |
DoS-slowhttp-D1 | 4.02 min | 43 pk/s | 23.4 MB |
DoS-slowhttp-D2 | 4.37 min | 21 pk/s | 8.8 MB |
DoS-slowhttp-D3 | 8.02 min | 49 pk/s | 48.7 MB |
DoS-slowhttp-D4 | 8.02 min | 40.5 pk/s | 44.1 MB |
DoS-slowhttp-D8 | 4.42 min | 28 pk/s | 10.0 MB |
DoS-slowhttp-D9 | 4.02 min | 31 pk/s | 19.7 MB |
DoS-slowhttp-D10 | 4.27 min | 44 pk/s | 19.7 MB |
DDoS-bot-D1 | 5 min | 292 pk/s | 16.4 GB |
DDoS-stomp-D5 | 5 min | 1298 pk/s | 41.2 GB |
DDoS-dyn-D9 | 10 min | 538 pk/s | 25.2 GB |
DDoS-tcp-D10 | 5 min | 3102 pk/s | 76.6 GB |
Web-sql-injection-D3 | 25.2 sec | 8 pk/s | 4.7 MB |
Web-sql-injection-D4 | 22.2 sec | 10 pk/s | 4.7 MB |
Web-command-injection-D1 | 2.00 min | 2 pk/s | 1.4 MB |
Web-xss-D2 | 45 sec | 34 pk/s | 3.0 MB |
Web-xss-D4 | 4.98 sec | 305 pk/s | 6.1 MB |
Infiltration-mitm-D1 | 25.47 min | 1.53 pk/s | 33.3 MB |
Infiltration-mitm-D2 | 52.35 min | 1.53 pk/s | 22.3 MB |
Infiltration-mitm-D3 | 24.93 min | 1.53 pk/s | 31.3 MB |
Infiltration-mitm-D4 | 24.08 min | 1.53 pk/s | 10.9 MB |
Infiltration-mitm-D5 | 52.47 min | 1.53 pk/s | 78.8 MB |
Infiltration-mitm-D7 | 31.98 min | 2.48 pk/s | 79.9 MB |
Infiltration-mitm-D9 | 51.78 min | 1.53 pk/s | 80.9 MB |
Infiltration-mitm-D10 | 22.95 min | 1.53 pk/s | 35.3 MB |
Each instance in FLNET2023 is meticulously labeled, offering valuable information about the network flow it represents. The labels not only designate whether a given instance is normal or malicious but also provide specific details about the type of attack involved, if any. These labels significantly simplify the task of training and testing intrusion detection models.
The FLNET2023 dataset prominently features four types of DDoS attacks - DDoS-dyn, DDoS-stomp, DDoS-bot, and DDoS-tcp - commonly observed in real-world network scenarios. Acknowledging that threats within a network environment extend beyond DDoS, our dataset includes a variety of other attack types such as DoS-slowhttp and Infiltration-mitm. It also encompasses web-based attacks, including Command Injection, XSS, and SQL Injection. The inclusion of these diverse attack types enhances the realism of the dataset and ensures its alignment with actual network threat landscapes.
The FLNET2023 dataset provides an extensive feature set, offering comprehensive details about each network flow. These features include source and destination IP addresses, port numbers, packet lengths, and timestamps, among others. This detailed feature set facilitates in-depth analysis and pattern recognition for intrusion detection models.
FLNET2023 includes rich metadata about each instance, which provides additional context and aids in data interpretation. The metadata includes details about the routers and their ip addresses which is crucial information for a comprehensive understanding of the dataset and for the effective development and evaluation of intrusion detection models.
The data points in the FLNET2023 dataset are collected from several unique nodes within the network topology, providing a well-rounded perspective of network activity. These collection points include various server nodes, and router nodes, each contributing to the dataset's diversity and depth. The collection points were selected with the intention of generating a dataset that reflects a broad range of network interactions. The IP address of the data collection points are given below in the table.
Node | Interface | IPv4 |
---|---|---|
D1 | eth0 | 10.0.48.2/24 |
eth1 | 10.0.49.1/24 | |
eth2 | 10.0.50.1/24 | |
eth3 | 10.0.51.1/24 | |
eth4 | 10.0.52.1/24 | |
D2 | eth0 | 10.0.29.1/24 |
eth1 | 10.0.30.2/24 | |
eth2 | 10.0.56.2/24 | |
D3 | eth0 | 10.0.22.2/24 |
eth1 | 10.0.23.1/24 | |
eth2 | 10.0.38.1/24 | |
eth3 | 10.0.40.2/24 | |
eth4 | 10.0.45.2/24 | |
eth5 | 10.0.47.2/24 | |
eth6 | 10.0.43.1/24 | |
D4 | eth0 | 10.0.1.2/24 |
eth1 | 10.0.2.2/24 | |
eth2 | 10.0.5.2/24 | |
eth3 | 10.0.21.1/24 | |
eth4 | 10.0.24.2/24 | |
eth5 | 10.0.25.1/24 | |
D5 | eth0 | 10.0.26.2/24 |
eth1 | 10.0.27.1/24 | |
eth2 | 10.0.34.2/24 | |
eth3 | 10.0.35.1/24 | |
D6 | eth0 | 10.0.6.2/24 |
eth1 | 10.0.7.1/24 | |
eth2 | 10.0.8.2/24 | |
eth3 | 10.0.35.2/24 | |
eth4 | 10.0.54.2/24 | |
D7 | eth0 | 10.0.53.2/24 |
eth1 | 10.0.54.1/24 | |
eth2 | 10.0.55.1/24 | |
eth3 | 10.0.56.1/24 | |
eth4 | 10.0.57.2/24 | |
D8 | eth0 | 10.0.8.2/24 |
eth1 | 10.0.9.1/24 | |
eth2 | 10.0.55.2/24 | |
eth3 | 10.0.60.2/24 | |
D9 | eth0 | 10.0.9.2/24 |
eth1 | 10.0.10.1/24 | |
eth2 | 10.0.11.1/24 | |
eth3 | 10.0.13.2/24 | |
eth4 | 10.0.16.2/24 | |
D10 | eth0 | 10.0.31.2/24 |
eth1 | 10.0.32.1/24 | |
eth2 | 10.0.33.1/24 | |
eth3 | 10.0.34.1/24 | |
eth4 | 10.0.36.1/24 | |
eth5 | 10.0.38.2/24 | |
eth6 | 10.0.39.1/24 | |
eth7 | 10.0.29.2/24 | |
eth8 | 10.0.49.2/24 | |
eth9 | 10.0.53.1/24 |
In addition to the data collection points, FLNET2023 incorporates a multitude of other router nodes, enhancing the realism and complexity of the network topology. These router nodes play pivotal roles in directing network traffic and simulating real-world network congestion and routing scenarios. Their inclusion in the topology helps portray a more authentic network environment and induces additional challenges for intrusion detection. The IP address of the other router nodes are given below in the table.
Node | Interface | IPv4 |
---|---|---|
R1 | eth0 | 10.0.46.1/24 |
R2 | eth0 | 10.0.45.1/24 |
eth1 | 10.0.59.1/24 | |
eth2 | 10.0.46.2/24 | |
R3 | eth0 | 10.0.47.1/24 |
eth1 | 10.0.59.2/24 | |
R4 | eth0 | 10.0.58.2/24 |
eth1 | 10.0.44.1/24 | |
R5 | eth0 | 10.0.43.2/24 |
eth1 | 10.0.58.1/24 | |
R6 | eth0 | 10.0.42.2/24 |
eth1 | 10.0.44.2/24 | |
eth2 | 10.0.48.1/24 | |
R7 | eth0 | 10.0.41.1/24 |
eth1 | 10.0.42.1/24 | |
R8 | eth0 | 10.0.39.2/24 |
eth1 | 10.0.40.1/24 | |
R9 | eth0 | 10.0.21.2/24 |
eth1 | 10.0.22.1/24 | |
R10 | eth0 | 10.0.23.2/24 |
eth1 | 10.0.24.1/24 | |
eth2 | 10.0.36.2/24 | |
eth3 | 10.0.37.2/24 | |
R11 | eth0 | 10.0.0.1/24 |
eth1 | 10.0.37.1/24 | |
R12 | eth0 | 10.0.0.2/24 |
eth1 | 10.0.1.1/24 | |
R13 | eth0 | 10.0.25.2/24 |
eth1 | 10.0.32.2/24 | |
R14 | eth0 | 10.0.28.1/24 |
eth1 | 10.0.33.2/24 | |
R15 | eth0 | 10.0.2.1/24 |
eth1 | 10.0.3.1/24 | |
eth2 | 10.0.27.2/24 | |
eth3 | 10.0.28.2/24 | |
R16 | eth0 | 10.0.4.2/24 |
eth1 | 10.0.5.1/24 | |
R17 | eth0 | 10.0.3.2/24 |
eth1 | 10.0.4.1/24 | |
eth2 | 10.0.6.1/24 | |
eth3 | 10.0.26.1/24 | |
R18 | eth0 | 10.0.7.2/24 |
eth1 | 10.0.60.1/24 | |
R19 | eth0 | 10.0.10.2/24 |
R20 | eth0 | 10.0.11.2/24 |
eth1 | 10.0.12.1/24 | |
R21 | eth0 | 10.0.12.2/24 |
eth1 | 10.0.13.1/24 | |
eth2 | 10.0.14.1/24 | |
eth3 | 10.0.15.1/24 | |
R22 | eth0 | 10.0.14.2/24 |
R23 | eth0 | 10.0.15.2/24 |
eth1 | 10.0.16.1/24 | |
eth2 | 10.0.17.1/24 | |
eth3 | 10.0.18.1/24 | |
eth4 | 10.0.29.2/24 | |
R24 | eth0 | 10.0.17.2/24 |
R25 | eth0 | 10.0.20.2/24 |
eth1 | 10.0.57.1/24 | |
R26 | eth0 | 10.0.18.2/24 |
eth1 | 10.0.19.1/24 | |
eth2 | 10.0.20.1/24 | |
R27 | eth0 | 10.0.19.2/24 |
R28 | eth0 | 10.0.30.1/24 |
eth1 | 10.0.31.1/24 | |
eth2 | 10.0.50.2/24 | |
R29 | eth0 | 10.0.52.2/24 |
R30 | eth0 | 10.0.51.2/24 |
The FLNET2023 dataset consists of labeled network flows including full packet payload in pcap format. Additionally, associated profiles, labelled flows and CSV files optimized for Federated learning are publicly accessible for researchers. It is publicly available for researchers to facilitate further advancements in the field of intrusion detection. If you intend to utilize our dataset in your work, we kindly request that you cite our associated paper.