2020
DOI: 10.21203/rs.3.rs-20786/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

IoT-Flock: An Open-source Framework for IoT Traffic Generation

Abstract: Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoT-specific security solutions. In order to design an IoT-based t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
46
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 15 publications
(46 citation statements)
references
References 10 publications
0
46
0
Order By: Relevance
“…This work aims to create MQTTset, an IoT dataset focused on MQTT communications. MQTTset was built by using IoT-Flock [ 42 ], a network traffic generator tool able to emulate IoT devices and networks based on MQTT and CoAP protocols. IoT-Flock provides the ability to configure the network scenario, in terms of nodes (e.g., sensor type, IP addresses, listening ports, etc.)…”
Section: Mqttset Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…This work aims to create MQTTset, an IoT dataset focused on MQTT communications. MQTTset was built by using IoT-Flock [ 42 ], a network traffic generator tool able to emulate IoT devices and networks based on MQTT and CoAP protocols. IoT-Flock provides the ability to configure the network scenario, in terms of nodes (e.g., sensor type, IP addresses, listening ports, etc.)…”
Section: Mqttset Datasetmentioning
confidence: 99%
“…Differently on the previous attack, this attack tries to saturate the resources by using a single connection instead of instantiate multiple connections. This attack was generated in this case by using a module inside the IoT-Flock tool [ 42 ].…”
Section: Mqttset Datasetmentioning
confidence: 99%
“…The IoT devices are resource constraint because of the limited amount of memory, computational capacity, and power [16,17]. The traditional security solutions are not adequate for efficiently detecting the malicious attacks in IoT environment due to the distinct features of IoT devices [17].…”
Section: Introductionmentioning
confidence: 99%
“…The traditional security mechanisms are deployed at two levels, i.e., network-level or host-level [20]. In the current Internet era, the host-level security approach is considered more secure than the network level security approach [16]. As IoT devices are low-powered and resource-constrained, host-level security mechanisms cannot be deployed.…”
Section: Introductionmentioning
confidence: 99%
“…Internet of Things (IoT) has inaugurated the concept of enabling our daily life objects to communicate with one another with minimal human intervention to lavish human life [1]. The burgeoning applications of IoT have initiated many innovative concepts like smart home, smart city, smart parking, smart industry, smart agriculture, etc., to make the existing systems smart, intelligent, and automated.…”
Section: Introductionmentioning
confidence: 99%