• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于物联网系统中网络入侵检测系统的基于仿真的数据集EmuIoT-VT

Emulation-Based Dataset EmuIoT-VT for NIDS in IoT Systems.

作者信息

Čenys Antanas, Hora Simran Kaur, Goranin Nikolaj

机构信息

Department of Information Systems, Vilnius Gediminas Technical University, 10223 Vilnius, Lithuania.

出版信息

Sensors (Basel). 2025 Aug 15;25(16):5077. doi: 10.3390/s25165077.

DOI:10.3390/s25165077
PMID:40871940
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12390070/
Abstract

Due to the rapid expansion of Internet of Things devices and their associated network, security has become a critical concern, necessitating the development of reliable security mechanisms. Anomaly-based NIDS leveraging machine learning and deep learning have emerged as key solutions in detecting abnormal network traffic patterns. However, one challenge that affects the detection rate of machine learning or deep learning-based anomaly NIDS is the class data imbalance present in the existing dataset. Datasets are crucial for the development and evaluation of anomaly-based NIDS for IoT systems. In this study, we introduce EmuIoT-VT, a dataset generated by creating virtual replicas of IoT devices implementing a novel emulation-based method, enabling realistic network traffic generation without relying on any external network emulators. The data was collected in an isolated offline environment to capture clean, uncontaminated network traffic. The EmuIoT-VT is balanced-by-design, containing 28,000 labeled records that are evenly distributed across devices, classes, and subclasses, and supports both binary and multiclass classification tasks. It includes 82 features extracted from raw PCAP data and includes attack categories such as DoS, brute force, reconnaissance, and exploitation. This article presents the novel method and creation of the EmuIoT-VT dataset, detailing data collection, balancing strategy, and details of the dataset structure, and proposes directions for future work.

摘要

由于物联网设备及其相关网络的迅速扩张,安全已成为一个关键问题,这就需要开发可靠的安全机制。基于异常的网络入侵检测系统(NIDS)利用机器学习和深度学习,已成为检测异常网络流量模式的关键解决方案。然而,影响基于机器学习或深度学习的异常NIDS检测率的一个挑战是现有数据集中存在的类数据不平衡问题。数据集对于物联网系统中基于异常的NIDS的开发和评估至关重要。在本研究中,我们引入了EmuIoT-VT,这是一个通过创建物联网设备的虚拟副本生成的数据集,采用了一种新颖的基于仿真的方法,无需依赖任何外部网络仿真器就能生成逼真的网络流量。数据是在隔离的离线环境中收集的,以捕获干净、未受污染的网络流量。EmuIoT-VT在设计上是平衡的,包含28000条带标签的记录,这些记录在设备、类和子类之间均匀分布,并支持二分类和多分类任务。它包括从原始PCAP数据中提取的82个特征,包括拒绝服务(DoS)、暴力破解、侦察和利用等攻击类别。本文介绍了EmuIoT-VT数据集的新颖方法和创建过程,详细说明了数据收集、平衡策略以及数据集结构的细节,并提出了未来工作的方向。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/abb5d9a704a2/sensors-25-05077-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/a57f0aabbaf1/sensors-25-05077-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/8729495ae87b/sensors-25-05077-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/3855d92836f7/sensors-25-05077-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/9a4d8338f893/sensors-25-05077-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/641f045d4392/sensors-25-05077-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/abb5d9a704a2/sensors-25-05077-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/a57f0aabbaf1/sensors-25-05077-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/8729495ae87b/sensors-25-05077-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/3855d92836f7/sensors-25-05077-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/9a4d8338f893/sensors-25-05077-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/641f045d4392/sensors-25-05077-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/faf2/12390070/abb5d9a704a2/sensors-25-05077-g006.jpg

相似文献

1
Emulation-Based Dataset EmuIoT-VT for NIDS in IoT Systems.用于物联网系统中网络入侵检测系统的基于仿真的数据集EmuIoT-VT
Sensors (Basel). 2025 Aug 15;25(16):5077. doi: 10.3390/s25165077.
2
Prescription of Controlled Substances: Benefits and Risks管制药品的处方:益处与风险
3
Smart deep learning model for enhanced IoT intrusion detection.用于增强物联网入侵检测的智能深度学习模型。
Sci Rep. 2025 Jul 1;15(1):20577. doi: 10.1038/s41598-025-06363-5.
4
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
5
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method.通过异常流量检测确保物联网通信安全:遗传算法与集成方法的协同作用
Sensors (Basel). 2025 Jun 30;25(13):4098. doi: 10.3390/s25134098.
6
Short-Term Memory Impairment短期记忆障碍
7
Improved model for intrusion detection in the Internet of Things.物联网中入侵检测的改进模型。
Sci Rep. 2025 Jul 1;15(1):21547. doi: 10.1038/s41598-025-92852-6.
8
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
9
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers.一种使用深度学习和Transformer的物联网网络中针对DDoS攻击的多类入侵检测系统。
Sensors (Basel). 2025 Aug 6;25(15):4845. doi: 10.3390/s25154845.
10
Identifying significant features in adversarial attack detection framework using federated learning empowered medical IoT network security.利用联邦学习赋能的医疗物联网网络安全在对抗攻击检测框架中识别显著特征。
Sci Rep. 2025 Aug 26;15(1):31485. doi: 10.1038/s41598-025-14913-0.

本文引用的文献

1
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms.基于机器学习算法的物联网网络中用于检测拒绝服务攻击的异常检测入侵检测系统
Sensors (Basel). 2024 Jan 22;24(2):713. doi: 10.3390/s24020713.
2
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.CICIoT2023:物联网环境中大规模攻击的实时数据集和基准
Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.