Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks

被引:36
作者
Essop, Ismael [1 ]
Ribeiro, Jose C. [2 ]
Papaioannou, Maria [1 ,2 ]
Zachos, Georgios [1 ,2 ]
Mantas, Georgios [1 ,2 ]
Rodriguez, Jonathan [2 ,3 ]
机构
[1] Univ Greenwich, Fac Sci & Engn, Chatham ME4 4TB, England
[2] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[3] Univ South Wales, Fac Comp Engn & Sci, Pontypridd CF37 1DL, M Glam, Wales
基金
欧盟地平线“2020”;
关键词
IoT; Industrial IoT; benign datasets generation; malicious datasets generation; Cooja simulator; Contiki OS; anomaly-based intrusion detection; SECURITY; INTERNET; THREATS;
D O I
10.3390/s21041528
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".
引用
收藏
页码:1 / 31
页数:31
相关论文
共 29 条
[1]  
Alaleddin Mehr Ardestani J., 2018, P CAN C EL COMP ENG, V2018
[2]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[3]  
[Anonymous], 2006, MOTEIV CORPORATION T
[4]  
[Anonymous], 2012, Recommendation ITU-T Y.2060. overview of the internet of things
[5]  
Bandekar A, 2017, IEEE ANN INT CONF CY, P1631, DOI 10.1109/CYBER.2017.8446380
[6]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[7]  
Clarence C., 2018, MACHINE LEARNING SEC
[8]   A Survey of Internet of Things (IoT) Authentication Schemes [J].
El-hajj, Mohammed ;
Fadlallah, Ahmad ;
Chamoun, Maroun ;
Serhrouchni, Ahmed .
SENSORS, 2019, 19 (05)
[9]   Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Argyriou, Antonios ;
Kosmanos, Dimitrios ;
Janicke, Helge .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 101 :55-82
[10]   Evaluating Critical Security Issues of the IoT World: Present and Future Challenges [J].
Frustaci, Mario ;
Pace, Pasquale ;
Aloi, Gianluca ;
Fortino, Giancarlo .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2483-2495