Skip to main content

Datasets

Standard Dataset

IIEST_IoTForge_Pro

Citation Author(s):
Pradeep Kumar (Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India)
Suvrajit Mullick (Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India)
Rajdeep Das (Department of Computer Science and Business Systems Institute of Engineering and Management Kolkata, India)
Ayushman Nandi (Department of Computer Science and Business Systems Institute of Engineering and Management Kolkata, India)
Indrajit Banerjee (Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India)
Submitted by:
PRADEEP KUMAR
Last updated:
DOI:
10.21227/c4z1-yc52
Data Format:
Research Article Link:
Links:
No Ratings Yet

Abstract

The necessity for strong security measures to fend off cyberattacks has increased due to the growing use of Industrial Internet of Things (IIoT) technologies. This research introduces IoTForge Pro, a comprehensive security testbed designed to generate a diverse and extensive intrusion dataset for IIoT environments. The testbed simulates various IIoT scenarios, incorporating network topologies and communication protocols to create realistic attack vectors and normal traffic patterns. The generated dataset, named ForgeIIOT, includes various attack types, such as denial-of-service, man-in-the-middle, ransomware, wildcard abuse and malware-based intrusions, providing a valuable resource for developing and evaluating intrusion detection systems (IDS). Additionally, we apply advanced machine learning techniques to analyze the ForgeIIOT dataset, demonstrating the effectiveness of different models in identifying and classifying various types of cyberattacks. Our experimental results highlight the potential of machine learning algorithms in enhancing the security of IIoT systems by accurately detecting anomalies and malicious activities. This research contributes to the field by offering a rich dataset and a robust framework for testing and improving IDS for IIoT, ultimately aiming to strengthen the cybersecurity posture of industrial networks.

Instructions:

The dataset consists of two folders: Preprocessed and Unprocessed. In the Preprocessed folder, machine learning has been applied to data containing 10 lakh samples with 96 features. The Unprocessed dataset folder contains 17 attack files named ddos_mp.csv, ddos_tcp.csv, dos_deauth.csv, dos_icmp.csv, dos_ipv4.csv, dos_land.csv, dos_udp.csv, malw_back.csv, mitm_arp.csv, mitm_dhcp.csv, mitm_ndp.csv, os_finger.csv, port_scan.csv, sybil.csv, vuln_scan.csv, wild_card.csv, and normal.csv. These files comprise 3 million samples with 159 features, plus 1 attack level.