Moosavi Seyed Amirhossein, Asgari Mojtaba, Kamel Seyed Reza
Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
Data Brief. 2024 Dec 3;57:111192. doi: 10.1016/j.dib.2024.111192. eCollection 2024 Dec.
With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks. Real traffic datasets for these networks are often unavailable due to confidentiality reasons. To address this, we propose a framework that uses existing real datasets and converts them into BACnet protocol network traffic with detailed network behaviour. In this method, a virtual machine is prepared for each controller based on real scenarios, and by creating a simulator for the controller on the virtual machine, real data previously collected under real conditions from existing datasets is injected into the network with the same date and time during the simulation. We performed three types of attacks, including Falsifying, Modifying, and covert channel attacks on the network. For covert channel attacks, the message was modelled in three forms: Plain text, hashed using SHA3-256, and encrypted using AES-256. Network traffic was recorded using Wireshark software in pcap format. The advantage of the generated dataset is that since we used real data, the data behaviour aligns with real conditions.
随着智能建筑的发展,针对智能建筑的网络攻击风险也在增加。智能建筑中设备间通信(尤其是暖通空调系统)所使用的一种流行且不断发展的协议是BACnet协议。机器学习算法和神经网络需要正常流量和真实攻击的数据集来开发能够检测异常并预防攻击的入侵检测(IDS)和预防(IPS)系统。由于保密原因,这些网络的真实流量数据集往往无法获取。为解决这一问题,我们提出了一个框架,该框架使用现有的真实数据集,并将其转换为具有详细网络行为的BACnet协议网络流量。在这种方法中,基于真实场景为每个控制器准备一个虚拟机,并通过在虚拟机上为控制器创建模拟器,将之前在真实条件下从现有数据集中收集的真实数据在模拟过程中以相同的日期和时间注入网络。我们对网络进行了三种类型的攻击,包括伪造、修改和隐蔽信道攻击。对于隐蔽信道攻击,消息以三种形式建模:明文、使用SHA3 - 256进行哈希处理以及使用AES - 256进行加密。使用Wireshark软件以pcap格式记录网络流量。生成的数据集的优点在于,由于我们使用了真实数据,数据行为与真实情况相符。