Skip to main content

Table 5 Properties of the CGNs (nodes, arcs, and rows needed to represent them) compared with the flows contained in the files used for the experiments

From: A novel botnet attack detection for IoT networks based on communication graphs

Dataset

Malware

ZeekFlows

Zeek Files

CGN Files

Rows

IP addresses

IP addresses-ports

(Mb)

(Mb)

CGN file

Nodes

Arcs

Nodes

Arcs

01_01_IoTMaleware

Hide &Seek

1008749

126

70

640194

602833

620842

640194

620842

03_01_IoTMaleware

Mushtik

156104

21

10

91897

65010

65153

91897

81406

09_01_IoTMaleware

linux-hiajime

6378294

849

578

5289007

5220276

5221075

5289007

6369855

35_01_IoTMaleware

Mirai

10447796

1186

439

4170803

4104749

4170803

4105278

4375867

36_01_IoTMaleware

Okiru

13645107

1573

1512

13608115

13599603

13599713

13608115

13608335

60_01_IoTMaleware

GagFyt

3581029

411

7

65569

31

33

65569

65671