• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

CICIoT2023:物联网环境中大规模攻击的实时数据集和基准

CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.

机构信息

Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.

出版信息

Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.

DOI:10.3390/s23135941
PMID:37447792
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10346235/
Abstract

Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number of IoT solutions in areas such as transportation and healthcare is increasing and new services are under development. In the last decade, society has experienced a drastic increase in IoT connections. In fact, IoT connections will increase in the next few years across different areas. Conversely, several challenges still need to be faced to enable efficient and secure operations (e.g., interoperability, security, and standards). Furthermore, although efforts have been made to produce datasets composed of attacks against IoT devices, several possible attacks are not considered. Most existing efforts do not consider an extensive network topology with real IoT devices. The main goal of this research is to propose a novel and extensive IoT attack dataset to foster the development of security analytics applications in real IoT operations. To accomplish this, 33 attacks are executed in an IoT topology composed of 105 devices. These attacks are classified into seven categories, namely DDoS, DoS, Recon, Web-based, brute force, spoofing, and Mirai. Finally, all attacks are executed by malicious IoT devices targeting other IoT devices. The dataset is available on the CIC Dataset website.

摘要

如今,物联网 (IoT) 概念在社会中扮演着关键角色,为不同行业带来了新的功能。物联网解决方案在交通和医疗等领域的数量正在增加,新的服务正在开发中。在过去的十年中,物联网连接数量急剧增加。事实上,物联网连接在未来几年将在不同领域中增长。相反,为了实现高效和安全的操作,仍需要面对一些挑战(例如互操作性、安全性和标准)。此外,尽管已经努力生成由针对物联网设备的攻击组成的数据集,但仍有一些可能的攻击未被考虑到。大多数现有工作都没有考虑到具有真实物联网设备的广泛网络拓扑。本研究的主要目标是提出一个新颖而广泛的物联网攻击数据集,以促进安全分析应用在真实物联网操作中的发展。为了实现这一目标,在由 105 个设备组成的物联网拓扑中执行了 33 种攻击。这些攻击被分为七类,即 DDoS、DoS、侦察、基于 Web 的、暴力破解、欺骗和 Mirai。最后,所有攻击都是由恶意物联网设备针对其他物联网设备发起的。该数据集可在 CIC 数据集网站上获取。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/ae739ecf5c40/sensors-23-05941-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/74c64190d995/sensors-23-05941-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/95486ec4a7d9/sensors-23-05941-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/60396c58d50a/sensors-23-05941-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/c0489738ef02/sensors-23-05941-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/4f82b6775bbe/sensors-23-05941-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/6387d4e8b336/sensors-23-05941-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/f54512afc6be/sensors-23-05941-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/3235712c3a5f/sensors-23-05941-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/040773edeccb/sensors-23-05941-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/ae739ecf5c40/sensors-23-05941-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/74c64190d995/sensors-23-05941-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/95486ec4a7d9/sensors-23-05941-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/60396c58d50a/sensors-23-05941-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/c0489738ef02/sensors-23-05941-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/4f82b6775bbe/sensors-23-05941-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/6387d4e8b336/sensors-23-05941-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/f54512afc6be/sensors-23-05941-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/3235712c3a5f/sensors-23-05941-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/040773edeccb/sensors-23-05941-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/719d/10346235/ae739ecf5c40/sensors-23-05941-g010.jpg

相似文献

1
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.CICIoT2023:物联网环境中大规模攻击的实时数据集和基准
Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.
2
A Framework for Malicious Traffic Detection in IoT Healthcare Environment.物联网医疗环境中的恶意流量检测框架。
Sensors (Basel). 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025.
3
Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models.利用机器学习和深度学习模型检测物联网设备的传输层和应用层 DDoS 攻击。
Sensors (Basel). 2022 Apr 28;22(9):3367. doi: 10.3390/s22093367.
4
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
5
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
6
IoT-DH dataset for classification, identification, and detection DDoS attack in IoT.用于物联网中DDoS攻击分类、识别和检测的物联网-数据处理数据集
Data Brief. 2024 May 6;54:110496. doi: 10.1016/j.dib.2024.110496. eCollection 2024 Jun.
7
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
8
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
9
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.利用以太坊区块链技术防止物联网设备的 DDoS 攻击。
Sensors (Basel). 2022 Sep 8;22(18):6806. doi: 10.3390/s22186806.
10
Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.基于多种机器学习模型的医疗物联网中基于中间盒的攻击检测。
Comput Intell Neurosci. 2022 Nov 28;2022:2037954. doi: 10.1155/2022/2037954. eCollection 2022.

引用本文的文献

1
MACML: Marrying attention and convolution-based meta-learning method for few-shot IoT intrusion detection.MACML:用于少样本物联网入侵检测的注意力与卷积相结合的元学习方法
PLoS One. 2025 Aug 29;20(8):e0331065. doi: 10.1371/journal.pone.0331065. eCollection 2025.
2
Emulation-Based Dataset EmuIoT-VT for NIDS in IoT Systems.用于物联网系统中网络入侵检测系统的基于仿真的数据集EmuIoT-VT
Sensors (Basel). 2025 Aug 15;25(16):5077. doi: 10.3390/s25165077.
3
Comparative analysis of deep learning and traditional methods for IoT botnet detection using a multi-model framework across diverse datasets.

本文引用的文献

1
A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation.一种基于流量聚合的生成 NIDS 个性化网络数据集的新框架。
Sensors (Basel). 2022 Feb 26;22(5):1847. doi: 10.3390/s22051847.
2
A Survey of Healthcare Internet-of-Things (HIoT): A Clinical Perspective.医疗物联网(HIoT)综述:临床视角
IEEE Internet Things J. 2020 Jan;7(1):53-71. doi: 10.1109/jiot.2019.2946359. Epub 2019 Oct 9.
3
MQTTset, a New Dataset for Machine Learning Techniques on MQTT.MQTTset,一个用于MQTT机器学习技术的新数据集。
使用多模型框架在不同数据集上对物联网僵尸网络检测的深度学习方法与传统方法进行比较分析。
Sci Rep. 2025 Aug 23;15(1):31072. doi: 10.1038/s41598-025-16553-w.
4
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers.一种使用深度学习和Transformer的物联网网络中针对DDoS攻击的多类入侵检测系统。
Sensors (Basel). 2025 Aug 6;25(15):4845. doi: 10.3390/s25154845.
5
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security.TwinFedPot:蜜罐智能提炼到数字孪生体以实现持久的智能交通安全性
Sensors (Basel). 2025 Jul 31;25(15):4725. doi: 10.3390/s25154725.
6
PACKETCLIP: multi-modal embedding of network traffic and language for cybersecurity reasoning.PACKETCLIP:用于网络安全推理的网络流量与语言的多模态嵌入
Front Artif Intell. 2025 Jul 28;8:1593944. doi: 10.3389/frai.2025.1593944. eCollection 2025.
7
KronNet a lightweight Kronecker enhanced feed forward neural network for efficient IoT intrusion detection.KronNet:一种用于高效物联网入侵检测的轻量级克罗内克增强前馈神经网络。
Sci Rep. 2025 Jul 1;15(1):20850. doi: 10.1038/s41598-025-08921-3.
8
Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure.在智慧城市基础设施中采用SAE-GRU深度学习进行可扩展的僵尸网络检测。
PeerJ Comput Sci. 2025 Apr 30;11:e2869. doi: 10.7717/peerj-cs.2869. eCollection 2025.
9
Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization.基于表格变换器和自然启发式超参数优化的物联网入侵检测联邦学习框架
Front Big Data. 2025 May 14;8:1526480. doi: 10.3389/fdata.2025.1526480. eCollection 2025.
10
A Real Network Environment Dataset for Traffic Analysis.一个用于流量分析的真实网络环境数据集。
Sci Data. 2025 May 7;12(1):756. doi: 10.1038/s41597-025-04876-2.
Sensors (Basel). 2020 Nov 18;20(22):6578. doi: 10.3390/s20226578.
4
Array programming with NumPy.使用 NumPy 进行数组编程。
Nature. 2020 Sep;585(7825):357-362. doi: 10.1038/s41586-020-2649-2. Epub 2020 Sep 16.
5
Performance surfaces of a single-layer perceptron.单层感知器的性能曲面。
IEEE Trans Neural Netw. 1990;1(3):268-74. doi: 10.1109/72.80252.