4.8 Article

X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 5, 页码 3962-3977

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3102056

关键词

Industrial Internet of Things; Protocols; Security; Interoperability; Botnet; Feature extraction; Taxonomy; Cybersecurity; data set; Industrial Internet of Things (IIoT); intrusion detection

向作者/读者索取更多资源

The Industrial Internet of Things (IIoT) is a high-value target for cyber attacks, and developing security solutions that fit its requirements is challenging due to the lack of accurate data. To address this, we propose X-IIoTID, an intrusion data set for IIoT that includes multi-view features of connectivity protocols, device activities, attack types, and protocols.
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions. However, as they lack the capability to deal with an IIoT's co-existing heterogeneity and interoperability, developing new universal security solutions to fit its requirements is critical. This is challenging due to the scarcity of accurate data about IIoT systems' activities, connectivities, and attack behaviors. In addition, owing to their multiplatform connectivity protocols and multivendor devices, collecting and creating such data are also challenging. To tackle these issues, we propose a holistic approach for generating an appropriate intrusion data set for an IIoT called X-IIoTID, a connectivity-agnostic and device-agnostic intrusion data set for fitting the heterogeneity and interoperability of IIoT systems. It includes the behaviors of new IIoT connectivity protocols, activities of recent devices, diverse attack types and scenarios, and various attack protocols. It defines an attack taxonomy and consists of multiview features, such as network traffic, host resources, logs and alerts. X-IIoTID is evaluated using popular machine and deep learning algorithms and compared with 18 intrusion data sets to verify its novelty.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Privacy-preserving big data analytics for cyber-physical systems

Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull

Summary: This paper studies the role of big data component analysis in protecting sensitive information from illegal access. The technique of independent component analysis is used to transform CPS information while preserving data utility, and the results demonstrate that it is more effective than other privacy-preservation techniques.

WIRELESS NETWORKS (2022)

Article Computer Science, Information Systems

Developing a Security Testbed for Industrial Internet of Things

Muna AL-Hawawreh, Elena Sitnikova

Summary: Achieving security for brownfield IIoT systems is a significant challenge due to their legacy devices and integration with new IoT technologies. A new generic end-to-end IIoT security testbed is proposed, which is easily reproducible and configurable for testing various security scenarios. Experiments demonstrate the effectiveness of the testbed for operation and security testing compared to existing testbeds.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Artificial Intelligence

A threat intelligence framework for protecting smart satellite-based healthcare networks

Muna Al-Hawawreh, Nour Moustafa, Jill Slay

Summary: This study presents a new threat intelligence framework to examine and model attacks on the CoAP protocol in IIoHT systems, introducing RDoS as a new threat and utilizing deep learning for real-time discovery of attack network behaviors. The experiment results show that the proposed discovery model outperforms other conventional machine learning algorithms in revealing RDoS and effectively protecting SmartSat-IIoHT networks.

NEURAL COMPUTING & APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

An Online Model to Minimize Energy Consumption of IoT Sensors in Smart Cities

Muna Al-Hawawreh, Ibrahim Elgendi, Kumudu Munasinghe

Summary: The Internet of Things (IoT) is facing challenges related to data redundancy and energy consumption. To address this, we propose an AI-powered solution that utilizes autocorrelation and deep reinforcement learning to make smart decisions about transmitting data, thereby reducing data redundancy and minimizing sensor power consumption.

IEEE SENSORS JOURNAL (2022)

Proceedings Paper Computer Science, Information Systems

How to define utility for use in practical wireless network resource trading platforms

Ramtin Ranji, Elena Sitnikova, Frank den Hartog

Summary: Excessive usage of wirelessly networked equipment in densely populated areas can lead to performance degradation due to interference and traffic congestion. Enabling constructive collaboration between actors for spectrum sharing based on trading and consensus is a possible solution, but defining utility remains a complex issue that requires consideration of various factors.

2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) (2021)

Article Computer Science, Information Systems

Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT

Muna Al-Hawawreh, Elena Sitnikova, Neda Aboutorab

Summary: This paper introduces a targeted ransomware detection model tailored for IIoT systems, utilizing Asynchronous Peer-to-Peer Federated Learning and Deep Learning techniques to effectively detect known and unknown attacks in these systems with their heterogeneous and distributed nature.

IEEE ACCESS (2021)

Article Education & Educational Research

Learning environment of a distance and partly-distance postgraduate coursework programs

Keith F. Joiner, Leanne Rees, Britt Levett, Elena Sitnikova, Dijana Townsend

Summary: This research examined the learning environments of five university postgraduate subjects taught through distance education. Significant differences were found in the environment across most demographics, with older students showing preferences for more Involvement and Student Cohesiveness, while students with lower or average prior academic achievement demonstrated better environmental fit. The study highlights the importance of considering demographic factors in designing effective online learning environments.

LEARNING ENVIRONMENTS RESEARCH (2021)

Article Computer Science, Hardware & Architecture

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems

Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil

Summary: The paper introduces a new privacy-preserving anomaly detection framework called PPAD-CPS, which protects confidential information and detects malicious observations in power systems and their network traffic. Experimental results show that the framework is more effective than four recent techniques and outperforms seven peer anomaly detection techniques in terms of detection rate, false positive rate, and computational time.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2021)

Article Computer Science, Information Systems

Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

Merna Gamal, Hala M. Abbas, Nour Moustafa, Elena Sitnikova, Rowayda A. Sadek

Summary: The paper introduces a new IDS based on Few-Shot Deep Learning, known as CNN-IDS, which automatically identifies zero-day attacks and protects IoT systems. By utilizing a filtered Information Gain method and a one-dimensional CNN algorithm, the proposed model enhances attack detection rates.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems

Marwa Keshk, Benjamin Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa

Summary: Cyber-Physical Systems (CPS) are crucial for global critical infrastructure and are vulnerable to Advanced Persistent Threats (APTs), necessitating the development of efficient privacy-preserving techniques. This paper provides a comprehensive review of current privacy-preserving techniques for protecting CPS systems and data from cyber attacks, discussing the importance of privacy preservation and CPS components.

IEEE ACCESS (2021)

Article Education & Educational Research

Efficacy of structured peer critiquing in postgraduate coursework

Keith. F. Joiner, Leanne Rees, Britt Levett, Elena Sitnikova, Dijana Townsend

Summary: This research examined the effectiveness of structured peer critiquing for students with different levels of prior achievement in postgraduate courses delivered online. It found that structured peer critiquing was more effective for students with lower or average prior achievement, and forums were a more subtle means of structuring critiquing and engagement than direct exchange. Care is needed to ensure online debate is incisive.

STUDIES IN HIGHER EDUCATION (2021)

暂无数据