MU-IoT: A New IoT Intrusion Dataset for Network and Application Layer Attacks Analysis

被引:0
作者
Clinton, Urikhimbam Boby [1 ]
Hoque, Nazrul [1 ]
机构
[1] Manipur Univ, Dept Comp Sci, Imphal 795003, Manipur, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Internet of Things; Telecommunication traffic; Feature extraction; Cyberattack; Network intrusion; Protocols; Performance evaluation; Costs; Industrial Internet of Things; Computer security; IoT dataset; cybersecurity; network testbed; machine learning; ANALYTICS; TAXONOMY; BOTNET; IIOT;
D O I
10.1109/ACCESS.2024.3494052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the growth of IoT networks increases exponentially, the number of cyber attacks is also increasing on IoT networks day-by-day. This results in the vital requirement of cyber security mechanisms to secure IoT networks from cyberattacks. To build such a security mechanism, researchers and cybersecurity practitioners need relevant IoT datasets. However, until now, only a few publicly available IoT network intrusion datasets exist in the literature. Moreover, these datasets lack coverage of IoT network traffic containing IoT application layer protocols like AMQP, XMPP, STOMP, etc. and various IoT-based attacks. So, in this work, we generate a new realistic and comprehensive IoT network intrusion dataset called MU-IoT for IoT cybersecurity. The network traffic contained in the MU-IoT dataset is collected from the Manipur University (MU) IoT Smart Lab, which is our own IoT network testbed. The testbed includes more than 30 devices, which include both physical and emulated IoT devices, and general-purpose devices such as laptops, desktops, servers, etc., that are usually present in a Smart Lab. The dataset contains normal network traffic generated from various applications and attack network traffic comprised of 16 attack types, including IoT-based attacks, which are categorized into six categories. From the testbed, we collected 22.8 GB of raw network data and extracted 15.8 GB of preprocessed network data by using our own feature extraction approach. The preprocessed network data contains 121 flow-based features and 3 class labels of more than 34.8 million records. Additionally, this dataset covers extensive IoT-specific application protocols and a variety of normal network behaviours, which is a notable advantage over existing datasets. The MU-IoT dataset can be utilized to develop and validate machine learning-based Intrusion Detection and Mitigation Systems (IDMS). Moreover, the MU-IoT dataset helps to validate the centralized and federated learning-based IDMS. In addition, we also include the prior exploratory data analysis with the ranking of the features given by various feature selection algorithms as well as from our own feature ranking approach and the performance given by some common machine learning algorithms, as a future reference to the research community. The MU-IoT dataset is publicly available in the link https://manipuruniv.ac.in/CSDmuIOTdataset/.
引用
收藏
页码:166068 / 166092
页数:25
相关论文
共 47 条
  • [1] A SEL for attack detection in IoT/IIoT networks
    Abdulkareem, Sulyman Age
    Foh, Chuan Heng
    Carrez, Francois
    Moessner, Klaus
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [2] Blockchain-IoT Healthcare Applications and Trends: A Review
    Al-Nbhany, Wafaa A. N. A.
    Zahary, Ammar T.
    Al-Shargabi, Asma A.
    [J]. IEEE ACCESS, 2024, 12 : 4178 - 4212
  • [3] DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
    Alatram, Alaa
    Sikos, Leslie F.
    Johnstone, Mike
    Szewczyk, Patryk
    Kang, James Jin
    [J]. COMPUTER NETWORKS, 2023, 231
  • [4] TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah
    Moustafa, Nour
    Tari, Zahir
    Mahmood, Abdun
    Anwar, Adnan
    [J]. IEEE ACCESS, 2020, 8 : 165130 - 165150
  • [5] A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection
    Alshehri, Mohammed S.
    Saidani, Oumaima
    Alrayes, Fatma S.
    Abbasi, Saadullah Farooq
    Ahmad, Jawad
    [J]. IEEE ACCESS, 2024, 12 : 45762 - 45772
  • [6] Cyber Scanning: A Comprehensive Survey
    Bou-Harb, Elias
    Debbabi, Mourad
    Assi, Chadi
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) : 1496 - 1519
  • [7] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [8] Classification of DDoS attack traffic on SDN network environment using deep learning
    Clinton, Urikhimbam Boby
    Hoque, Nazrul
    Singh, Khumukcham Robindro
    [J]. CYBERSECURITY, 2024, 7 (01):
  • [9] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [10] Design of Intrusion Detection System Using GA and CNN for MQTT-Based IoT Networks
    Dandapat, Asimkiran
    Mondal, Bhaskar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (04) : 2059 - 2082