The development of an internet of things (Iot) network traffic dataset with simulated attack data.

Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Wahyudi, Dimas, Septian, Tri Wanda, Idris, Mohd. Yazid, Budiarto, Rahmat
Format: Article
Language:English
Published: Taiwan Academic Network Management Committee 2023
Subjects:
Online Access:http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf
http://eprints.utm.my/106766/
http://dx.doi.org/10.53106/160792642023032402013
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.106766
record_format eprints
spelling my.utm.1067662024-07-28T06:28:44Z http://eprints.utm.my/106766/ The development of an internet of things (Iot) network traffic dataset with simulated attack data. Stiawan, Deris Wahyudi, Dimas Septian, Tri Wanda Idris, Mohd. Yazid Budiarto, Rahmat T58.5-58.64 Information technology Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number of datasets publicly available such as DARPA, Twente, ISCX2012, ADFA, CIC-IDS2017, CSE-CICIDS2018, CIC-DDOS2019, MQTT-IoT-IDS-2020, and UNSW-NB15 that have been used by researchers to evaluate performance of the Intrusion Detection Systems (IDSs), nevertheless, the datasets creation are not based on real-life scenarios and rely only on one communication protocol. This paper produces a dataset that is created using real-life scenarios. The data are captured from an IoT test-bed network consists of six sensors running IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee) communication protocols and considering normal as well as attacks traffics. Furthermore, the robustness of the dataset for recognizing the types of data traffics is evaluated using Intrusion Detection Engine (IDE) with Naïve String Matching. The experiments on dataset robustness show promising results, i.e.: Accuracy level of 99.92%, Precision of 100%, False Positive Rate (FPR) of 0, and False Negative Rate (FPR) of 0.0869. Taiwan Academic Network Management Committee 2023-03 Article PeerReviewed application/pdf en http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf Stiawan, Deris and Wahyudi, Dimas and Septian, Tri Wanda and Idris, Mohd. Yazid and Budiarto, Rahmat (2023) The development of an internet of things (Iot) network traffic dataset with simulated attack data. Journal of Internet Technology, 24 (2). pp. 345-356. ISSN 1607-9264 http://dx.doi.org/10.53106/160792642023032402013 DOI:10.53106/160792642023032402013
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T58.5-58.64 Information technology
spellingShingle T58.5-58.64 Information technology
Stiawan, Deris
Wahyudi, Dimas
Septian, Tri Wanda
Idris, Mohd. Yazid
Budiarto, Rahmat
The development of an internet of things (Iot) network traffic dataset with simulated attack data.
description Due to the complexity and multifaceted nature of Internet of Things (IoT) networks/systems, researchers in the field of IoT network security complain about the rareness of real life-based datasets and the limitation of heterogeneous of communication protocols used in the datasets. There are a number of datasets publicly available such as DARPA, Twente, ISCX2012, ADFA, CIC-IDS2017, CSE-CICIDS2018, CIC-DDOS2019, MQTT-IoT-IDS-2020, and UNSW-NB15 that have been used by researchers to evaluate performance of the Intrusion Detection Systems (IDSs), nevertheless, the datasets creation are not based on real-life scenarios and rely only on one communication protocol. This paper produces a dataset that is created using real-life scenarios. The data are captured from an IoT test-bed network consists of six sensors running IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee) communication protocols and considering normal as well as attacks traffics. Furthermore, the robustness of the dataset for recognizing the types of data traffics is evaluated using Intrusion Detection Engine (IDE) with Naïve String Matching. The experiments on dataset robustness show promising results, i.e.: Accuracy level of 99.92%, Precision of 100%, False Positive Rate (FPR) of 0, and False Negative Rate (FPR) of 0.0869.
format Article
author Stiawan, Deris
Wahyudi, Dimas
Septian, Tri Wanda
Idris, Mohd. Yazid
Budiarto, Rahmat
author_facet Stiawan, Deris
Wahyudi, Dimas
Septian, Tri Wanda
Idris, Mohd. Yazid
Budiarto, Rahmat
author_sort Stiawan, Deris
title The development of an internet of things (Iot) network traffic dataset with simulated attack data.
title_short The development of an internet of things (Iot) network traffic dataset with simulated attack data.
title_full The development of an internet of things (Iot) network traffic dataset with simulated attack data.
title_fullStr The development of an internet of things (Iot) network traffic dataset with simulated attack data.
title_full_unstemmed The development of an internet of things (Iot) network traffic dataset with simulated attack data.
title_sort development of an internet of things (iot) network traffic dataset with simulated attack data.
publisher Taiwan Academic Network Management Committee
publishDate 2023
url http://eprints.utm.my/106766/1/MohdYazidIdris2023_TheDevelopmentofanInternetofThings%20IoTNetworkTraffic.pdf
http://eprints.utm.my/106766/
http://dx.doi.org/10.53106/160792642023032402013
_version_ 1805880864628801536