• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

为物联网和工业物联网网络中基于异常的入侵检测系统生成数据集。

Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.

作者信息

Essop Ismael, Ribeiro José C, Papaioannou Maria, Zachos Georgios, Mantas Georgios, Rodriguez Jonathan

机构信息

Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, UK.

Instituto de Telecomunicações, Aveiro 3810-193, Portugal.

出版信息

Sensors (Basel). 2021 Feb 23;21(4):1528. doi: 10.3390/s21041528.

DOI:10.3390/s21041528
PMID:33672108
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7926730/
Abstract

Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".

摘要

在过去几年里,我们见证了物联网(IoT)和工业物联网网络的出现,它们给公民、社会和工业带来了巨大的好处。然而,它们异构且资源受限的特性使它们容易受到各种威胁。因此,迫切需要开发新颖的安全机制,如准确高效的基于异常的入侵检测系统(AIDS),以便在这些网络充分发挥其潜力之前投入使用。尽管如此,目前缺乏最新的、具有代表性的且结构良好的特定于物联网/工业物联网的数据集,这些数据集应是公开可用的,并构成用于训练和评估物联网/工业物联网网络入侵检测系统中使用的机器学习模型的基准数据集。填补这一研究空白是我们近期研究工作的主要目标,因此,我们专注于利用Cooja模拟器生成新的带标签的特定于物联网/工业物联网的数据集。据我们所知,这是首次系统地使用Cooja模拟器来生成全面的物联网/工业物联网数据集。在本文中,我们展示了我们为生成初始的良性和恶意物联网/工业物联网数据集所采用的方法。生成的特定于工业物联网的信息是从Contiki插件“powertrace”和Cooja工具“无线电消息”中捕获的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/bcd2acad071b/sensors-21-01528-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/a78451365a4b/sensors-21-01528-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/76cea2d66166/sensors-21-01528-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/bcd2acad071b/sensors-21-01528-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/a78451365a4b/sensors-21-01528-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/76cea2d66166/sensors-21-01528-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6fec/7926730/bcd2acad071b/sensors-21-01528-g011.jpg

相似文献

1
Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.为物联网和工业物联网网络中基于异常的入侵检测系统生成数据集。
Sensors (Basel). 2021 Feb 23;21(4):1528. doi: 10.3390/s21041528.
2
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
3
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.物联网系统完整性:工业应用的安全性、攻击及对策的全面调查。
Sensors (Basel). 2021 May 24;21(11):3654. doi: 10.3390/s21113654.
4
Efficient Anomaly Detection for Smart Hospital IoT Systems.智能医院物联网系统的高效异常检测
Sensors (Basel). 2021 Feb 3;21(4):1026. doi: 10.3390/s21041026.
5
Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection.基于自动可解释特征选择的物联网系统入侵检测的注意 Transformer 深度学习算法。
PLoS One. 2023 Oct 16;18(10):e0286652. doi: 10.1371/journal.pone.0286652. eCollection 2023.
6
Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.迈向安全的物联网网络:使用自生成数据集对元启发式算法与卷积神经网络相结合的综合研究。
MethodsX. 2024 May 4;12:102747. doi: 10.1016/j.mex.2024.102747. eCollection 2024 Jun.
7
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
8
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things.基于 FC 的工业医疗物联网的轻量级混合深度学习隐私保护模型。
Sensors (Basel). 2022 Mar 9;22(6):2112. doi: 10.3390/s22062112.
9
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.基于分布强化学习和生成对抗网络的工业物联网异常检测。
Sensors (Basel). 2022 Oct 22;22(21):8085. doi: 10.3390/s22218085.
10
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.工业物联网(IIoT)的最新技术、安全对策和持续挑战:综述。
Sensors (Basel). 2021 Oct 6;21(19):6647. doi: 10.3390/s21196647.

引用本文的文献

1
Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks.为物联网医疗网络中的资源受限设备实现基于异常的入侵检测。
Sensors (Basel). 2025 Feb 17;25(4):1216. doi: 10.3390/s25041216.
2
Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.迈向安全的物联网网络:使用自生成数据集对元启发式算法与卷积神经网络相结合的综合研究。
MethodsX. 2024 May 4;12:102747. doi: 10.1016/j.mex.2024.102747. eCollection 2024 Jun.
3
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.

本文引用的文献

1
A Survey of Internet of Things (IoT) Authentication Schemes.物联网(IoT)认证方案综述。
Sensors (Basel). 2019 Mar 6;19(5):1141. doi: 10.3390/s19051141.
基于机器和深度学习方法的物联网 RPL 基础 6LoWPAN 攻击检测的系统文献综述。
Sensors (Basel). 2022 Apr 29;22(9):3400. doi: 10.3390/s22093400.