Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks

被引:32
|
作者
Essop, Ismael [1 ]
Ribeiro, Jose C. [2 ]
Papaioannou, Maria [1 ,2 ]
Zachos, Georgios [1 ,2 ]
Mantas, Georgios [1 ,2 ]
Rodriguez, Jonathan [2 ,3 ]
机构
[1] Univ Greenwich, Fac Sci & Engn, Chatham ME4 4TB, England
[2] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[3] Univ South Wales, Fac Comp Engn & Sci, Pontypridd CF37 1DL, M Glam, Wales
基金
欧盟地平线“2020”;
关键词
IoT; Industrial IoT; benign datasets generation; malicious datasets generation; Cooja simulator; Contiki OS; anomaly-based intrusion detection; SECURITY; INTERNET; THREATS;
D O I
10.3390/s21041528
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".
引用
收藏
页码:1 / 31
页数:31
相关论文
共 50 条
  • [1] Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments
    Choudhary V.
    Tanwar S.
    Multimedia Tools and Applications, 2024, 83 (36) : 84331 - 84355
  • [2] Investigation of RBFN Application for Anomaly-Based Intrusion Detection on IoT Networks
    Upman, Vikas
    Goranin, Nikolaj
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 103 - 109
  • [3] An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Porfyrakis, Kyriakos
    C. S. Bastos, Joaquim Manuel
    Rodriguez, Jonathan
    2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING, 2023,
  • [4] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):
  • [5] Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
    Alsoufi, Muaadh A.
    Siraj, Maheyzah Md
    Ghaleb, Fuad A.
    Al-Razgan, Muna
    Al-Asaly, Mahfoudh Saeed
    Alfakih, Taha
    Saeed, Faisal
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 823 - 845
  • [6] An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor
    Singh K.P.
    Kesswani N.
    SN Computer Science, 2022, 3 (2)
  • [7] Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks
    Butt, Nazia
    Shahid, Ana
    Qureshi, Kashif Naseer
    Haider, Sajjad
    Ibrahim, Ashraf Osman
    Binzagr, Faisal
    Arshad, Noman
    MATHEMATICS, 2022, 10 (23)
  • [8] Anomaly-based intrusion detection system for IoT networks through deep learning model
    Saba, Tanzila
    Rehman, Amjad
    Sadad, Tariq
    Kolivand, Hoshang
    Bahaj, Saeed Ali
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [9] Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review
    Alsoufi, Muaadh A.
    Razak, Shukor
    Siraj, Maheyzah Md
    Nafea, Ibtehal
    Ghaleb, Fuad A.
    Saeed, Faisal
    Nasser, Maged
    APPLIED SCIENCES-BASEL, 2021, 11 (18):
  • [10] Review on Approaches of Federated Modeling in Anomaly-Based Intrusion Detection for IoT Devices
    Isma'ila, Umar Audi
    Danyaro, Kamaluddeen Usman
    Muazu, Aminu Aminu
    Maiwada, Umar Danjuma
    IEEE ACCESS, 2024, 12 : 30941 - 30961