Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks

被引:32
|
作者
Essop, Ismael [1 ]
Ribeiro, Jose C. [2 ]
Papaioannou, Maria [1 ,2 ]
Zachos, Georgios [1 ,2 ]
Mantas, Georgios [1 ,2 ]
Rodriguez, Jonathan [2 ,3 ]
机构
[1] Univ Greenwich, Fac Sci & Engn, Chatham ME4 4TB, England
[2] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[3] Univ South Wales, Fac Comp Engn & Sci, Pontypridd CF37 1DL, M Glam, Wales
基金
欧盟地平线“2020”;
关键词
IoT; Industrial IoT; benign datasets generation; malicious datasets generation; Cooja simulator; Contiki OS; anomaly-based intrusion detection; SECURITY; INTERNET; THREATS;
D O I
10.3390/s21041528
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".
引用
收藏
页码:1 / 31
页数:31
相关论文
共 50 条
  • [11] Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets
    Hajj, Suzan
    El Sibai, Rayane
    Bou Abdo, Jacques
    Demerjian, Jacques
    Makhoul, Abdallah
    Guyeux, Christophe
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (04):
  • [12] Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
    Liu, Zhipeng
    Hu, Junyi
    Liu, Yang
    Roy, Kaushik
    Yuan, Xiaohong
    Xu, Jinsheng
    IEEE ACCESS, 2023, 11 : 91116 - 91132
  • [13] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147
  • [14] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha, Sawssen
    Aljuhani, Ahamed
    Abdellafou, Khawla Ben
    Taouali, Okba
    Liouane, Noureddine
    Alazab, Mamoun
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 231 - 242
  • [15] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha S.
    Aljuhani A.
    Abdellafou K.B.
    Taouali O.
    Liouane N.
    Alazab M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (1) : 231 - 242
  • [16] Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
    Eskandari, Mojtaba
    Janjua, Zaffar Haider
    Vecchio, Massimo
    Antonelli, Fabio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6882 - 6897
  • [17] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Govind P. Prabhat Kumar
    Rakesh Gupta
    Automatic Control and Computer Sciences, 2021, 55 : 137 - 147
  • [18] Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
    Gillen, Robert E.
    Carter, Jason M.
    Craig, Christopher
    Johnson, Jordan A.
    Scott, Stephen L.
    2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, : 360 - 366
  • [19] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS
    Wei, Min
    Kim, Keecheon
    Wang, Ping
    FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886
  • [20] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +