Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation

10/05/2021
by   Arvin Hekmati, et al.
0

As IoT deployments grow in scale for applications such as smart cities, they face increasing cyber-security threats. In particular, as evidenced by the famous Mirai incident and other ongoing threats, large-scale IoT device networks are particularly susceptible to being hijacked and used as botnets to launch distributed denial of service (DDoS) attacks. Real large-scale datasets are needed to train and evaluate the use of machine learning algorithms such as deep neural networks to detect and defend against such DDoS attacks. We present a dataset from an urban IoT deployment of 4060 nodes describing their spatio-temporal activity under benign conditions. We also provide a synthetic DDoS attack generator that injects attack activity into the dataset based on tunable parameters such as number of nodes attacked and duration of attack. We discuss some of the features of the dataset. We also demonstrate the utility of the dataset as well as our synthetic DDoS attack generator by using them for the training and evaluation of a simple multi-label feed-forward neural network that aims to identify which nodes are under attack and when.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/21/2020

IoT Network Security: Requirements, Threats, and Countermeasures

IoT devices are increasingly utilized in critical infrastructure, enterp...
research
04/06/2021

IoT Security: Botnet detection in IoT using Machine learning

The acceptance of Internet of Things (IoT) applications and services has...
research
02/15/2023

Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems

We present a comprehensive study on applying machine learning to detect ...
research
07/29/2023

Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model

Attackers are now using sophisticated techniques, like polymorphism, to ...
research
05/04/2022

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Zero Day Threats (ZDT) are novel methods used by malicious actors to att...
research
12/11/2020

On the Observability and Controllability of Large-Scale IoT Networks: Reducing Number of Unmatched Nodes via Link Addition

In this paper, we study large-scale networks in terms of observability a...
research
09/01/2023

Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

We present a novel approach to identify ransomware campaigns derived fro...

Please sign up or login with your details

Forgot password? Click here to reset