X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

被引:122
作者
Al-Hawawreh, Muna [1 ]
Sitnikova, Elena [1 ]
Aboutorab, Neda [1 ]
机构
[1] Univ New South Wales, Australian Def Force Acad, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
关键词
Industrial Internet of Things; Protocols; Security; Interoperability; Botnet; Feature extraction; Taxonomy; Cybersecurity; data set; Industrial Internet of Things (IIoT); intrusion detection; SYSTEM;
D O I
10.1109/JIOT.2021.3102056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions. However, as they lack the capability to deal with an IIoT's co-existing heterogeneity and interoperability, developing new universal security solutions to fit its requirements is critical. This is challenging due to the scarcity of accurate data about IIoT systems' activities, connectivities, and attack behaviors. In addition, owing to their multiplatform connectivity protocols and multivendor devices, collecting and creating such data are also challenging. To tackle these issues, we propose a holistic approach for generating an appropriate intrusion data set for an IIoT called X-IIoTID, a connectivity-agnostic and device-agnostic intrusion data set for fitting the heterogeneity and interoperability of IIoT systems. It includes the behaviors of new IIoT connectivity protocols, activities of recent devices, diverse attack types and scenarios, and various attack protocols. It defines an attack taxonomy and consists of multiview features, such as network traffic, host resources, logs and alerts. X-IIoTID is evaluated using popular machine and deep learning algorithms and compared with 18 intrusion data sets to verify its novelty.
引用
收藏
页码:3962 / 3977
页数:16
相关论文
共 50 条
[1]   Securing smart vehicles from relay attacks using machine learning [J].
Ahmad, Usman ;
Song, Hong ;
Bilal, Awais ;
Alazab, Mamoun ;
Jolfaei, Alireza .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (04) :2665-2682
[2]   Real time dataset generation framework for intrusion detection systems in IoT [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :414-423
[3]  
Al-Hawawreh M., 2019, POULTRY SCI, P83, DOI DOI 10.1399/EPS.2019.280
[4]   Developing a Security Testbed for Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5558-5573
[5]   Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :126-130
[6]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[7]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[8]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[9]   Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases [J].
Ani, Uchenna P. Daniel ;
Watson, Jeremy M. ;
Green, Benjamin ;
Craggs, Barnaby ;
Nurse, Jason R. C. .
Journal of Cyber Security Technology, 2021, 5 (02) :71-119
[10]  
[Anonymous], 2017, P AUSTRALASIAN COMPU