The Comparison of Cybersecurity Datasets

被引:14
作者
Alshaibi, Ahmed [1 ]
Al-Ani, Mustafa [1 ]
Al-Azzawi, Abeer [1 ]
Konev, Anton [1 ]
Shelupanov, Alexander [1 ]
机构
[1] Tomsk State Univ Control Syst & Radioelect, Fac Secur, Dept Complex Informat Secur Comp Syst, Tomsk 634000, Russia
关键词
cybersecurity; network security; datasets; machine learning; cyberattacks; IoT; CYBER-PHYSICAL SYSTEMS; FEATURE-SELECTION; ATTACK DETECTION; PRIVACY; THINGS;
D O I
10.3390/data7020022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks in any layer of its architecture. In this regard, minimizing the attacks could be the major objective of cybersecurity, while knowing that they cannot be fully avoided. The number of people resisting the attacks and protection system is less than those who prepare the attacks. Well-reasoned and learning-backed problems must be addressed by the cyber machine, using appropriate methods alongside quality datasets. The purpose of this paper is to describe the development of the cybersecurity datasets used to train the algorithms which are used for building IDS detection models, as well as analyzing and summarizing the different and famous internet of things (IoT) attacks. This is carried out by assessing the outlines of various studies presented in the literature and the many problems with IoT threat detection. Hybrid frameworks have shown good performance and high detection rates compared to standalone machine learning methods in a few experiments. It is the researchers' recommendation to employ hybrid frameworks to identify IoT attacks for the foreseeable future.
引用
收藏
页数:18
相关论文
共 50 条
[1]   Securing Insulin Pump System Using Deep Learning and Gesture Recognition [J].
Ahmad, Usman ;
Song, Hong ;
Bilal, Awais ;
Saleem, Shahzad ;
Ullah, Asad .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1716-1719
[2]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[3]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[4]  
Barreno M., 2006, P 2006 ACM S INF COM, P16
[5]   An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J].
Beaver, Justin M. ;
Borges-Hink, Raymond C. ;
Buckner, Mark. A. .
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, :54-59
[6]   Cyber-physical systems clouds: A survey [J].
Chaari, Rihab ;
Ellouze, Fatma ;
Koubaa, Anis ;
Qureshi, Basit ;
Pereira, Nuno ;
Youssef, Habib ;
Tovar, Eduardo .
COMPUTER NETWORKS, 2016, 108 :260-278
[7]  
Chowdhury Abdullahi, 2019, Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, P1426
[8]  
Cinque M, 2009, INT PARALL DISTRIB P, P1384
[9]   Intrusion detection based on Machine Learning techniques in computer networks [J].
Dina, Ayesha S. ;
Manivannan, D. .
INTERNET OF THINGS, 2021, 16
[10]   Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications [J].
Diro, Abebe ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) :124-130