ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets

被引:183
作者
Booij, Tim M. [1 ]
Chiscop, Irina [1 ]
Meeuwissen, Erik [1 ]
Moustafa, Nour [2 ]
den Hartog, Frank T. H. [2 ]
机构
[1] TNO, Netherlands Org Appl Sci Res, Dept Cyber Secur & Robustness, NL-2595 DA The Hague, Netherlands
[2] Univ New South Wales, Australian Ctr Cyber Secur, Canberra, ACT 2612, Australia
关键词
Internet of Things; Monitoring; Feature extraction; Botnet; Telemetry; Protocols; Network intrusion detection; Internet of Things (IoT); intrusion detection; machine learning algorithms; network security; statistical analysis; INTERNET; THINGS;
D O I
10.1109/JIOT.2021.3085194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential. To this end, network intrusion data sets are fundamental, as many attack detection strategies have to be trained and evaluated using such data sets. In this article, we introduce the description, statistical analysis, and machine learning evaluation of the novel ToN_IoT data set. A comparison to other recent IoT data sets shows the importance of heterogeneity within these data sets, and how differences between data sets may have a huge impact on detection performance. In a cross-training experiment, we show that the inclusion of different data collection methods and a large diversity of the monitored features are of crucial importance for IoT network intrusion data sets to be useful for the industry. We also explain that the practical application of IoT data sets in operational environments requires the standardization of feature descriptions and cyberattack classes. This can only be achieved with a joint effort from the research community.
引用
收藏
页码:485 / 496
页数:12
相关论文
共 32 条
[1]  
A0
[2]  
urAevic Natasa., 2017, International Journal of Advances in Computer Science Its Applications, V6, P7
[3]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[4]   The application of internet of things in healthcare: a systematic literature review and classification [J].
Ahmadi, Hossein ;
Arji, Goli ;
Shahmoradi, Leila ;
Safdari, Reza ;
Nilashi, Mehrbakhsh ;
Alizadeh, Mojtaba .
UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2019, 18 (04) :837-869
[5]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[6]  
[Anonymous], 2020, Unit 42
[7]   IoT APPLICATIONS AND SERVICES IN SPACE INFORMATION NETWORKS [J].
Bacco, Manlio ;
Boero, Luca ;
Cassara, Pietro ;
Colucci, Marco ;
Gotta, Alberto ;
Marchese, Mario ;
Patrone, Fabio .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (02) :31-37
[8]  
Booij T. M., 2021, STAT ANAL TON IOT DA, DOI [10.21227/frw4-sk06, DOI 10.21227/FRW4-SK06]
[9]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[10]  
Cover T. M., 2005, Wiley Series in Telecommunications and Signal Processing, V1st, DOI 10.1002/047174882X