Wormhole Attack Simulation Dataset

A Wormhole attack in a dataset, where certain nodes (wormhole nodes) create an illusion of having a shorter path in network communications to attract traffic, the dataset will reflect network traffic patterns altered by these deceptive links. Here’s the structure for 95,000 records:ID: Unique identi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hussain, Muhammad Zunnurain Hussain, Hasan, Muhammad Zulkifl Hasan
Format: Dataset
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A Wormhole attack in a dataset, where certain nodes (wormhole nodes) create an illusion of having a shorter path in network communications to attract traffic, the dataset will reflect network traffic patterns altered by these deceptive links. Here’s the structure for 95,000 records:ID: Unique identifier for each packet or interaction.Timestamp: Randomized date and time.Source_IP: IP address of the source node.Destination_IP: IP address of the destination node.Packet_Size: Size of the packet sent from source to destination.Action: Type of action (e.g., data_request, data_transfer).Is_Wormhole: Indicates if the interaction involved a wormhole node (True or False).
DOI:10.21227/da7k-dr50