ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets

被引:149
作者
Booij, Tim M. [1 ]
Chiscop, Irina [1 ]
Meeuwissen, Erik [1 ]
Moustafa, Nour [2 ]
den Hartog, Frank T. H. [2 ]
机构
[1] TNO, Netherlands Org Appl Sci Res, Dept Cyber Secur & Robustness, NL-2595 DA The Hague, Netherlands
[2] Univ New South Wales, Australian Ctr Cyber Secur, Canberra, ACT 2612, Australia
关键词
Internet of Things; Monitoring; Feature extraction; Botnet; Telemetry; Protocols; Network intrusion detection; Internet of Things (IoT); intrusion detection; machine learning algorithms; network security; statistical analysis; INTERNET; THINGS;
D O I
10.1109/JIOT.2021.3085194
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is reshaping our connected world as the number of lightweight devices connected to the Internet is rapidly growing. Therefore, high-quality research on intrusion detection in the IoT domain is essential. To this end, network intrusion data sets are fundamental, as many attack detection strategies have to be trained and evaluated using such data sets. In this article, we introduce the description, statistical analysis, and machine learning evaluation of the novel ToN_IoT data set. A comparison to other recent IoT data sets shows the importance of heterogeneity within these data sets, and how differences between data sets may have a huge impact on detection performance. In a cross-training experiment, we show that the inclusion of different data collection methods and a large diversity of the monitored features are of crucial importance for IoT network intrusion data sets to be useful for the industry. We also explain that the practical application of IoT data sets in operational environments requires the standardization of feature descriptions and cyberattack classes. This can only be achieved with a joint effort from the research community.
引用
收藏
页码:485 / 496
页数:12
相关论文
共 32 条
  • [1] A0
  • [2] urAevic Natasa., 2017, International Journal of Advances in Computer Science Its Applications, V6, P7
  • [3] Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
  • [4] The application of internet of things in healthcare: a systematic literature review and classification
    Ahmadi, Hossein
    Arji, Goli
    Shahmoradi, Leila
    Safdari, Reza
    Nilashi, Mehrbakhsh
    Alizadeh, Mojtaba
    [J]. UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2019, 18 (04) : 837 - 869
  • [5] TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah
    Moustafa, Nour
    Tari, Zahir
    Mahmood, Abdun
    Anwar, Adnan
    [J]. IEEE ACCESS, 2020, 8 : 165130 - 165150
  • [6] [Anonymous], 2020, Rep. Unit 42
  • [7] IoT APPLICATIONS AND SERVICES IN SPACE INFORMATION NETWORKS
    Bacco, Manlio
    Boero, Luca
    Cassara, Pietro
    Colucci, Marco
    Gotta, Alberto
    Marchese, Mario
    Patrone, Fabio
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (02) : 31 - 37
  • [8] Booij T. M., 2021, STAT ANAL TON IOT DA, DOI [10.21227/frw4-sk06, DOI 10.21227/FRW4-SK06]
  • [9] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701
  • [10] Cover T., 1991, ELEMENTS INFORM THEO