Literature DB >> 33672108

Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.

Ismael Essop1, José C Ribeiro2, Maria Papaioannou1,2, Georgios Zachos1,2, Georgios Mantas1,2, Jonathan Rodriguez2,3.   

Abstract

Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".

Entities:  

Keywords:  Contiki OS; Cooja simulator; Industrial IoT; IoT; anomaly-based intrusion detection; benign datasets generation; malicious datasets generation

Year:  2021        PMID: 33672108     DOI: 10.3390/s21041528

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


  1 in total

Review 1.  A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.

Authors:  Taief Alaa Al-Amiedy; Mohammed Anbar; Bahari Belaton; Arkan Hammoodi Hasan Kabla; Iznan H Hasbullah; Ziyad R Alashhab
Journal:  Sensors (Basel)       Date:  2022-04-29       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.