2021
DOI: 10.3390/s21041528
|View full text |Cite
|
Sign up to set email alerts
|

Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks

Abstract: Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheles… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 36 publications
(38 citation statements)
references
References 27 publications
0
38
0
Order By: Relevance
“…In this subsection, the following six existing datasets for the training and evaluation of IoT AIDSs are reviewed: (i) the LWSNDR dataset [26], (ii) the dataset presented in [27] for classifying IoT devices using network traffic characteristics, (iii) the "Bot-IoT" dataset [28], (iv) the dataset presented in [29] for detecting DoS attacks on IoT devices using network traffic traces, (v) the "TON_IoT Telemetry" dataset [15], which is the most recent and representative data-driven IoT/IIoT-based dataset [30], and (vi) the dataset generated as described in [7], which includes information related to the behavior of the IoT devices and the IoT network traffic based on a simulated benign scenario and a simulated malicious scenario. In this work, we utilized a part of the "TON_IoT Telemetry" dataset [15] and a part of the dataset generated as presented in [7] for the training and evaluation of the ML algorithms.…”
Section: Datasets For Aids In Iotmentioning
confidence: 99%
See 4 more Smart Citations
“…In this subsection, the following six existing datasets for the training and evaluation of IoT AIDSs are reviewed: (i) the LWSNDR dataset [26], (ii) the dataset presented in [27] for classifying IoT devices using network traffic characteristics, (iii) the "Bot-IoT" dataset [28], (iv) the dataset presented in [29] for detecting DoS attacks on IoT devices using network traffic traces, (v) the "TON_IoT Telemetry" dataset [15], which is the most recent and representative data-driven IoT/IIoT-based dataset [30], and (vi) the dataset generated as described in [7], which includes information related to the behavior of the IoT devices and the IoT network traffic based on a simulated benign scenario and a simulated malicious scenario. In this work, we utilized a part of the "TON_IoT Telemetry" dataset [15] and a part of the dataset generated as presented in [7] for the training and evaluation of the ML algorithms.…”
Section: Datasets For Aids In Iotmentioning
confidence: 99%
“…Therefore, more efforts are required toward datasets including information about the behavior of IoT devices when they function under normal operation conditions, as well as when they function under attack. To this direction, and to the best of our knowledge, a first step is the IoT device behavior datasets generated by the work in [7]. The IoT device behavior datasets include information related to the behavior of the IoT devices based on a simulated benign scenario and a simulated malicious scenario.…”
Section: Iot Device Behavior Datasetsmentioning
confidence: 99%
See 3 more Smart Citations