DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol

被引:24
作者
Alatram, Alaa [1 ]
Sikos, Leslie F. [1 ]
Johnstone, Mike [2 ]
Szewczyk, Patryk [1 ]
Kang, James Jin [1 ]
机构
[1] Edith Cowan Univ, Joondalup, WA, Australia
[2] Edith Cowan Univ, Sch Sci, Network Secur & Mobile App Dev, Joondalup, WA, Australia
关键词
MQTT; DDoS; Cybersecurity Dataset; Machine learning; CHALLENGES;
D O I
10.1016/j.comnet.2023.109809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices themselves, or using the devices to perform the attacks. These attacks are often successful due to the nature of the protocols used in the IoT. One popular protocol used for machine-to-machine IoT communications is the Message Queueing Telemetry Protocol (MQTT). Countermeasures for attacks against MQTT include testing defenses with existing datasets. However, there is a lack of real-world test datasets in this area. For this reason, this paper introduces a DoS/DDoS-MQTT-IoT dataset-that contains various DoS/DDoS attack scenarios using MQTT traffic-to help develop and test countermeasures against such attacks. To this end, a physical IoT testbed was constructed and a large volume of IoT data was generated that included standard MQTT traffic as well as 10 DoS scenarios. The usability of the dataset has been evaluated via machine learning.
引用
收藏
页数:8
相关论文
共 15 条
[1]  
[Anonymous], 1999, KDD Cup 1999 Data
[2]   Future challenges for smart cities: Cyber-security and digital forensics [J].
Baig, Zubair A. ;
Szewczyk, Patryk ;
Valli, Craig ;
Rabadia, Priya ;
Hannay, Peter ;
Chernyshev, Maxim ;
Johnstone, Mike ;
Kerai, Paresh ;
Ibrahim, Ahmed ;
Sansurooah, Krishnun ;
Syed, Naeem ;
Peacock, Matthew .
DIGITAL INVESTIGATION, 2017, 22 :3-13
[3]  
CAIDA, 2007, CAIDA DDOS ATT 2007
[4]  
Firdous S.N., 2020, IOT MQTT BASED DENIA
[5]   Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol [J].
Firdous, Syed Naeem ;
Baig, Zubair ;
Valli, Craig ;
Ibrahim, Ahmed .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :748-755
[6]  
Hindy H., 2020, INT NETWORKING C
[7]  
Johnstone M., 2020, Data Science in Cybersecurity and Cyberthreat Intelligence, P115, DOI DOI 10.1007/978-3-030-38788-4_6
[8]   Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J].
Koroniotis, Nickolaos ;
Moustafa, Nour ;
Sitnikova, Elena ;
Turnbull, Benjamin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :779-796
[9]  
Massachusetts Institute of Technology, 1999, 1999 DARPA INTR DET
[10]  
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)