MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

被引:4
作者
Qing, Yi [1 ]
Liu, Xiangyu [2 ]
Du, Yanhui [2 ]
机构
[1] Peoples Publ Secur Univ China, Dept Artificial Intelligence, Beijing 100038, Peoples R China
[2] Peoples Publ Secur Univ China, Dept Cybersecur, Beijing 100038, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Intrusion detection; IoT; malware; botnet; DDoS; dataset; INTERNET;
D O I
10.32604/cmc.2023.039980
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol-Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT devices as DDoS attackers in the construction process, while they did not use Internet applications as victims either. To supplement the description of the new trend of DDoS attacks in the dataset, we built an IoT environment with mainstream DDoS attack tools such as Mirai and BASHLITE being used to infect IoT devices and implement DDoS attacks against WEB servers. Then, data aggregated into a dataset named MBB-IoT were captured at WEB servers and IoT nodes. After the MBB-IoT dataset was split into a training set and a test set, it was applied to the training and testing of the Random Forests classification algorithm. The multi-class classification metrics were good and all above 90%. Secondly, in a cross-evaluation experiment based on Support Vector Machine (SVM), Light Gradient Boosting Machine (LightGBM), and Long Short Term Memory networks (LSTM) classification algorithms, the training set and test set were derived from different datasets (MBB-IoT or IoT-23), and the test performance is better when MBB-IoT is used as the training set.
引用
收藏
页码:2095 / 2119
页数:25
相关论文
共 36 条
[1]  
A10 Company System Engineers, 2022, A10 networks DDoS threat report
[2]  
[Anonymous], 2018, CICFlowmeter-V4.0 (Formerly Known as ISCXFlowMeter) Is a Network Traffic Bi-Flow Generator and Analyser for Anomaly Detection
[3]   NFStream A flexible network data analysis framework [J].
Aouini, Zied ;
Pekar, Adrian .
COMPUTER NETWORKS, 2022, 204
[4]   The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems [J].
Apruzzese, Giovanni ;
Pajola, Luca ;
Conti, Mauro .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04) :5152-5169
[5]   CVE Based Classification of Vulnerable IoT Systems [J].
Blinowski, Grzegorz J. ;
Piotrowski, Pawel .
THEORY AND APPLICATIONS OF DEPENDABLE COMPUTER SYSTEMS, DEPCOS-RELCOMEX 2020, 2020, 1173 :82-93
[6]   ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets [J].
Booij, Tim M. ;
Chiscop, Irina ;
Meeuwissen, Erik ;
Moustafa, Nour ;
den Hartog, Frank T. H. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) :485-496
[7]  
Claise B., 2004, Cisco systems netflow services export version 9, DOI DOI 10.17487/RFC3954
[8]   Towards the Development of a Realistic Multidimensional IoT Profiling Dataset [J].
Dadkhah, Sajjad ;
Mahdikhani, Hassan ;
Danso, Priscilla Kyei ;
Zohourian, Alireza ;
Truong, Kevin Anh ;
Ghorbani, Ali A. .
2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
[9]  
Deri L., 2003, PROC 2003 TERENA NET, P1
[10]  
Gamblin J., 2017, Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes