X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

被引:103
作者
Al-Hawawreh, Muna [1 ]
Sitnikova, Elena [1 ]
Aboutorab, Neda [1 ]
机构
[1] Univ New South Wales, Australian Def Force Acad, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
关键词
Industrial Internet of Things; Protocols; Security; Interoperability; Botnet; Feature extraction; Taxonomy; Cybersecurity; data set; Industrial Internet of Things (IIoT); intrusion detection; SYSTEM;
D O I
10.1109/JIOT.2021.3102056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions. However, as they lack the capability to deal with an IIoT's co-existing heterogeneity and interoperability, developing new universal security solutions to fit its requirements is critical. This is challenging due to the scarcity of accurate data about IIoT systems' activities, connectivities, and attack behaviors. In addition, owing to their multiplatform connectivity protocols and multivendor devices, collecting and creating such data are also challenging. To tackle these issues, we propose a holistic approach for generating an appropriate intrusion data set for an IIoT called X-IIoTID, a connectivity-agnostic and device-agnostic intrusion data set for fitting the heterogeneity and interoperability of IIoT systems. It includes the behaviors of new IIoT connectivity protocols, activities of recent devices, diverse attack types and scenarios, and various attack protocols. It defines an attack taxonomy and consists of multiview features, such as network traffic, host resources, logs and alerts. X-IIoTID is evaluated using popular machine and deep learning algorithms and compared with 18 intrusion data sets to verify its novelty.
引用
收藏
页码:3962 / 3977
页数:16
相关论文
共 50 条
  • [1] Securing smart vehicles from relay attacks using machine learning
    Ahmad, Usman
    Song, Hong
    Bilal, Awais
    Alazab, Mamoun
    Jolfaei, Alireza
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (04) : 2665 - 2682
  • [2] Real time dataset generation framework for intrusion detection systems in IoT
    Al-Hadhrami, Yahya
    Hussain, Farookh Khadeer
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 414 - 423
  • [3] Al-Harthi MA., 2019, POULTRY SCI, P83, DOI [10.1399/eps.2019.280, DOI 10.1399/EPS.2019.280]
  • [4] Developing a Security Testbed for Industrial Internet of Things
    AL-Hawawreh, Muna
    Sitnikova, Elena
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5558 - 5573
  • [5] Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network
    AL-Hawawreh, Muna
    Sitnikova, Elena
    [J]. 3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, : 126 - 130
  • [6] Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things
    Al-Hawawreh, Muna
    den Hartog, Frank
    Sitnikova, Elena
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 7137 - 7151
  • [7] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [8] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [9] Amin H., 2018, 5 INT S ICS SCADA CY, P11
  • [10] Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
    Ani, Uchenna P. Daniel
    Watson, Jeremy M.
    Green, Benjamin
    Craggs, Barnaby
    Nurse, Jason R. C.
    [J]. Journal of Cyber Security Technology, 2021, 5 (02) : 71 - 119