Real time dataset generation framework for intrusion detection systems in IoT

被引:59
作者
Al-Hadhrami, Yahya [1 ,2 ]
Hussain, Farookh Khadeer [1 ,2 ]
机构
[1] Univ Technol, Fac Engn & Informat Technol, Sch Comp Sci, Ultimo, NSW 2007, Australia
[2] Univ Technol, Fac Engn & Informat Technol, Ctr Artificial Intelligence, Ultimo, NSW 2007, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 108卷
关键词
IoT security; Trust; Intrusion detection system;
D O I
10.1016/j.future.2020.02.051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) has evolved in the last few years to become one of the hottest topics in the area of computer science research. This drastic increase in IoT applications across different disciplines, such as in health-care and smart industries, comes with a considerable security risk. This is not limited only to attacks on privacy; it can also extend to attacks on network availability and performance. Therefore, an intrusion detection system is essential to act as the first line of defense for the network. IDS systems and algorithms depend heavily on the quality of the dataset provided. Sadly, there has been a lack of work in evaluating and collecting intrusion detection system related datasets that are designed specifically for an IoT ecosystem. Most of the studies published focus on outdated and non-compatible datasets such as the KDD98 dataset. Therefore, in this paper, we aim to investigate the existing datasets and their applications for IoT environments. Then we introduce a real-time data collection framework for building a dataset for intrusion detection system evaluation and testing. The main advantages of the proposed dataset are that it contains features that are explicitly designed for the 6LoWPAN/RPL network, the most widely used protocol in the IoT environment. (C) 2020 Published by Elsevier B.V.
引用
收藏
页码:414 / 423
页数:10
相关论文
共 28 条
[1]  
Alexander R., 2012, RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, DOI DOI 10.17487/RFC6550
[2]  
[Anonymous], 2006, 80215 IEEE
[3]  
[Anonymous], 2017, IEEE Std 802.11ah-2016, P1, DOI [10.1109/IEEESTD.2017.7920364, DOI 10.1109/IEEESTD.2017.7920364]
[4]  
[Anonymous], 2011, CONTIKI OS OPERATING
[5]  
Biondi Philippe., 2011, Scapy
[6]  
CAIDA, 2007, Caida DDoS Attack Dataset
[7]  
Casas Pedro, 2016, P 2016 ACM SIGSAC C, P1805
[8]  
Creech G, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P4487
[9]  
Fontugne R., 2010, P 6 INT C, P1, DOI DOI 10.1145/1921168.1921179
[10]   Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling [J].
Haider, W. ;
Hu, J. ;
Slay, J. ;
Turnbull, B. P. ;
Xie, Y. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 87 :185-192