MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

被引:4
作者
Qing, Yi [1 ]
Liu, Xiangyu [2 ]
Du, Yanhui [2 ]
机构
[1] Peoples Publ Secur Univ China, Dept Artificial Intelligence, Beijing 100038, Peoples R China
[2] Peoples Publ Secur Univ China, Dept Cybersecur, Beijing 100038, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Intrusion detection; IoT; malware; botnet; DDoS; dataset; INTERNET;
D O I
10.32604/cmc.2023.039980
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol-Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT devices as DDoS attackers in the construction process, while they did not use Internet applications as victims either. To supplement the description of the new trend of DDoS attacks in the dataset, we built an IoT environment with mainstream DDoS attack tools such as Mirai and BASHLITE being used to infect IoT devices and implement DDoS attacks against WEB servers. Then, data aggregated into a dataset named MBB-IoT were captured at WEB servers and IoT nodes. After the MBB-IoT dataset was split into a training set and a test set, it was applied to the training and testing of the Random Forests classification algorithm. The multi-class classification metrics were good and all above 90%. Secondly, in a cross-evaluation experiment based on Support Vector Machine (SVM), Light Gradient Boosting Machine (LightGBM), and Long Short Term Memory networks (LSTM) classification algorithms, the training set and test set were derived from different datasets (MBB-IoT or IoT-23), and the test performance is better when MBB-IoT is used as the training set.
引用
收藏
页码:2095 / 2119
页数:25
相关论文
共 36 条
[11]  
Garcia S., 2020, IoT-23: Alabeled dataset with malicious and benign IoT network traffic (Version 1.0.0)
[12]   Toward the Protection of IoT Networks: Introducing the LATAM-DDoS-IoT Dataset [J].
Genaro Almaraz-Rivera, Josue ;
Arturo Perez-Diaz, Jesus ;
Antonio Cantoral-Ceballos, Jose ;
Felipe Botero, Juan ;
Trejo, Luis A. .
IEEE ACCESS, 2022, 10 :106909-106920
[13]  
Hickey A., 2017, A. Why packets per second (PPS) matter in DDoS defense
[14]  
Hughes D., 2016, The DDoS arms race
[15]  
Inacio C.M., 2010, Proceedings of LISA'10: 24th Large Installation System Administration Conference, P107
[16]  
Jackson EJ, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P15
[17]  
Jakkula V., 2006, School of EECS, Washington State University, V37
[18]  
Ke GL, 2017, ADV NEUR IN, V30
[19]  
Khider Ibrahim, 2011, 2011 International Conference on Electrical and Control Engineering, P5902, DOI 10.1109/ICECENG.2011.6057450
[20]   Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset [J].
Koroniotis, Nickolaos ;
Moustafa, Nour ;
Sitnikova, Elena ;
Turnbull, Benjamin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :779-796