The development of an internet of things (Iot) network traffic dataset with simulated attack data.
Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taiwan Academic Network Management Committee
2023
|
Subjects: | |
Online Access: | http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf http://eprints.utm.my/106766/ http://dx.doi.org/10.53106/160792642023032402013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.106766 |
---|---|
record_format |
eprints |
spelling |
my.utm.1067662024-07-28T06:28:44Z http://eprints.utm.my/106766/ The development of an internet of things (Iot) network traffic dataset with simulated attack data. Stiawan, Deris Wahyudi, Dimas Septian, Tri Wanda Idris, Mohd. Yazid Budiarto, Rahmat T58.5-58.64 Information technology Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number of datasets publicly available such as DARPA, Twente, ISCX2012, ADFA, CIC-IDS2017, CSE-CICIDS2018, CIC-DDOS2019, MQTT-IoT-IDS-2020, and UNSW-NB15 that have been used by researchers to evaluate performance of the Intrusion Detection Systems (IDSs), nevertheless, the datasets creation are not based on real-life scenarios and rely only on one communication protocol. This paper produces a dataset that is created using real-life scenarios. The data are captured from an IoT test-bed network consists of six sensors running IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee) communication protocols and considering normal as well as attacks traffics. Furthermore, the robustness of the dataset for recognizing the types of data traffics is evaluated using Intrusion Detection Engine (IDE) with Naïve String Matching. The experiments on dataset robustness show promising results, i.e.: Accuracy level of 99.92%, Precision of 100%, False Positive Rate (FPR) of 0, and False Negative Rate (FPR) of 0.0869. Taiwan Academic Network Management Committee 2023-03 Article PeerReviewed application/pdf en http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf Stiawan, Deris and Wahyudi, Dimas and Septian, Tri Wanda and Idris, Mohd. Yazid and Budiarto, Rahmat (2023) The development of an internet of things (Iot) network traffic dataset with simulated attack data. Journal of Internet Technology, 24 (2). pp. 345-356. ISSN 1607-9264 http://dx.doi.org/10.53106/160792642023032402013 DOI:10.53106/160792642023032402013 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
T58.5-58.64 Information technology |
spellingShingle |
T58.5-58.64 Information technology Stiawan, Deris Wahyudi, Dimas Septian, Tri Wanda Idris, Mohd. Yazid Budiarto, Rahmat The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
description |
Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number of datasets publicly available such as DARPA, Twente, ISCX2012, ADFA, CIC-IDS2017, CSE-CICIDS2018, CIC-DDOS2019, MQTT-IoT-IDS-2020, and UNSW-NB15 that have been used by researchers to evaluate performance of the Intrusion Detection Systems (IDSs), nevertheless, the datasets creation are not based on real-life scenarios and rely only on one communication protocol. This paper produces a dataset that is created using real-life scenarios. The data are captured from an IoT test-bed network consists of six sensors running IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee) communication protocols and considering normal as well as attacks traffics. Furthermore, the robustness of the dataset for recognizing the types of data traffics is evaluated using Intrusion Detection Engine (IDE) with Naïve String Matching. The experiments on dataset robustness show promising results, i.e.: Accuracy level of 99.92%, Precision of 100%, False Positive Rate (FPR) of 0, and False Negative Rate (FPR) of 0.0869. |
format |
Article |
author |
Stiawan, Deris Wahyudi, Dimas Septian, Tri Wanda Idris, Mohd. Yazid Budiarto, Rahmat |
author_facet |
Stiawan, Deris Wahyudi, Dimas Septian, Tri Wanda Idris, Mohd. Yazid Budiarto, Rahmat |
author_sort |
Stiawan, Deris |
title |
The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
title_short |
The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
title_full |
The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
title_fullStr |
The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
title_full_unstemmed |
The development of an internet of things (Iot) network traffic dataset with simulated attack data. |
title_sort |
development of an internet of things (iot) network traffic dataset with simulated attack data. |
publisher |
Taiwan Academic Network Management Committee |
publishDate |
2023 |
url |
http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf http://eprints.utm.my/106766/ http://dx.doi.org/10.53106/160792642023032402013 |
_version_ |
1805880864628801536 |