Skip to main content

2020 | OriginalPaper | Buchkapitel

A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks

verfasst von : Imtiaz Ullah, Qusay H. Mahmoud

Erschienen in: Advances in Artificial Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The exponential growth of the Internet of Things (IoT) devices provides a large attack surface for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the target IoT network resources with malicious activity. New techniques and detection algorithms required a well-designed dataset for IoT networks. Firstly, we reviewed the weaknesses of various intrusion detection datasets. Secondly, we proposed a new dataset namely IoTID20 generated dataset from [1]. Thirdly we provide a significant set of features with their corresponding weights. Finally, we propose a new detection classification methodology using the generated dataset. Our proposed IoT botnet dataset will provide a reference point to identify anomalous activity across the IoT networks. The IoT Botnet dataset can be accessed from [2]. The new IoTID20 dataset will provide a foundation for the development of new intrusion detection techniques in IoT networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of - DARPA Information Survivability Conference and Exposition DISCEX 2000, vol. 2, pp. 12–26 (2000) Lippmann, R.P., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of - DARPA Information Survivability Conference and Exposition DISCEX 2000, vol. 2, pp. 12–26 (2000)
5.
Zurück zum Zitat Haines, J.W., Rossey, L.M., Lippmann, R.P., Cunningham, R.K.: Extending the DARPA off-line intrusion detection evaluations. In: Proceedings of - DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 1, pp. 35–45 (2001) Haines, J.W., Rossey, L.M., Lippmann, R.P., Cunningham, R.K.: Extending the DARPA off-line intrusion detection evaluations. In: Proceedings of - DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 1, pp. 35–45 (2001)
6.
Zurück zum Zitat Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227–261 (2000)CrossRef Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227–261 (2000)CrossRef
8.
Zurück zum Zitat Sangster, B., et al.: Toward instrumenting network warfare competitions to generate labeled datasets. In: USENIX Security Workshop Cyber Security Experimentation Test, pp. 1–6 (2009) Sangster, B., et al.: Toward instrumenting network warfare competitions to generate labeled datasets. In: USENIX Security Workshop Cyber Security Experimentation Test, pp. 1–6 (2009)
9.
Zurück zum Zitat Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)CrossRef
11.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium Computational Intelligence Security Defence Applications CISDA 2009, pp. 1–6 (2009) Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium Computational Intelligence Security Defence Applications CISDA 2009, pp. 1–6 (2009)
12.
Zurück zum Zitat Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Proceedings of 2015 Military Communications and Information Systems Conference MilCIS 2015, pp. 1–6 (2015) Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Proceedings of 2015 Military Communications and Information Systems Conference MilCIS 2015, pp. 1–6 (2015)
13.
Zurück zum Zitat Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184–208 (2016)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184–208 (2016)CrossRef
15.
Zurück zum Zitat Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP 2018 – Proceedings of 4th International Conference Information System Security and Privacy, January 2018, pp. 108–116 (2018) Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP 2018 – Proceedings of 4th International Conference Information System Security and Privacy, January 2018, pp. 108–116 (2018)
16.
Zurück zum Zitat Lashkari, A.H., Gil, G.D., Mamun, M.S.I., Ghorbani, A.A.: Characterization of tor traffic using time based features. In: ICISSP 2017 – Proceedings of 3rd International Conference Information System Security and Privacy, January 2017, pp. 253–262 (2017) Lashkari, A.H., Gil, G.D., Mamun, M.S.I., Ghorbani, A.A.: Characterization of tor traffic using time based features. In: ICISSP 2017 – Proceedings of 3rd International Conference Information System Security and Privacy, January 2017, pp. 253–262 (2017)
17.
Zurück zum Zitat Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: Proceedings of International Carnahan Conference Security Technology, October 2019 (2019) Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: Proceedings of International Carnahan Conference Security Technology, October 2019 (2019)
18.
Zurück zum Zitat Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic Botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779–796 (2019)CrossRef Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic Botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779–796 (2019)CrossRef
19.
Zurück zum Zitat Meidan, Y., et al.: N-BaIoT-Network-based detection of IoT bBotnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)CrossRef Meidan, Y., et al.: N-BaIoT-Network-based detection of IoT bBotnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)CrossRef
Metadaten
Titel
A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks
verfasst von
Imtiaz Ullah
Qusay H. Mahmoud
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-47358-7_52

Premium Partner