TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems

被引:373
作者
Alsaedi, Abdullah [1 ]
Moustafa, Nour [2 ]
Tari, Zahir [1 ]
Mahmood, Abdun [3 ]
Anwar, Adnan [4 ]
机构
[1] RMIT Univ, Sch Sci, Melbourne, Vic 3000, Australia
[2] Univ New South Wales, ADFA, Sch Engn & Informat Technol, Campbell, ACT 2612, Australia
[3] La Trobe Univ, Sch Comp Sci & Informat Technol, Bundoora, Vic 3086, Australia
[4] Deakin Univ, Sch Informat Technol, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic 3220, Australia
关键词
Intrusion detection; Telemetry; Sensors; Internet of Things; Machine learning; Australia; Internet of Things (IoT); Industrial Internet of Things (IIoT); cybersecurity; intrusion detection systems (IDSs); dataset; INDUSTRIAL INTERNET; ATTACK DETECTION; SECURITY; THINGS; RANSOMWARE; ANALYTICS; THREAT;
D O I
10.1109/ACCESS.2020.3022862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent and remote management, it also increases the risk of cyber-attacks. The potential threats to IoT applications and the need to reduce risk have recently become an interesting research topic. It is crucial that effective Intrusion Detection Systems (IDSs) tailored to IoT applications be developed. Such IDSs require an updated and representative IoT dataset for training and evaluation. However, there is a lack of benchmark IoT and IIoT datasets for assessing IDSs-enabled IoT systems. This paper addresses this issue and proposes a new data-driven IoT/IIoT dataset with the ground truth that incorporates a label feature indicating normal and attack classes, as well as a type feature indicating the sub-classes of attacks targeting IoT/IIoT applications for multi-classification problems. The proposed dataset, which is named TON_IoT, includes Telemetry data of IoT/IIoT services, as well as Operating Systems logs and Network traffic of IoT network, collected from a realistic representation of a medium-scale network at the Cyber Range and IoT Labs at the UNSW Canberra (Australia). This paper also describes the proposed dataset of the Telemetry data of IoT/IIoT services and their characteristics. TON_IoT has various advantages that are currently lacking in the state-of-the-art datasets: i) it has various normal and attack events for different IoT/IIoT services, and ii) it includes heterogeneous data sources. We evaluated the performance of several popular Machine Learning (ML) methods and a Deep Learning model in both binary and multi-class classification problems for intrusion detection purposes using the proposed Telemetry dataset.
引用
收藏
页码:165130 / 165150
页数:21
相关论文
共 55 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[3]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[4]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[5]   GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things [J].
Aljawarneh, Shadi A. ;
Vangipuram, Radhakrishna .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (06) :4376-4413
[6]  
Alsaedi A., 2020, T IIOT DATASET EVALU
[7]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[8]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[9]  
[Anonymous], 2013, INTRO STAT LEARNING
[10]  
[Anonymous], 2016, Deep Learning