BlueTack

Citation Author(s):
Devrim
Unal
Submitted by:
Devrim Unal
Last updated:
Sat, 01/09/2021 - 01:52
DOI:
10.21227/skhs-0b39
Data Format:
Links:
License:
1
1 rating - Please login to submit your rating.

Abstract 

Bluetooth communication is widely adopted in IoMT devices due to its various benefits. Nevertheless, because of its simplicity as a personal wireless communication protocol, Bluetooth lacks the security mechanisms which may result in devastating outcomes for patients treated using wireless medical devices.

Instructions: 

We developed a Bluetooth dataset using realistic traffic generated using the e-healthcare testbed described above. The dataset comprises of abstract meta-information from traffic flow of the Bluetooth enabled IoMT network. The Dataset was built in 3 phases. Initially, in the pre-processing phase, data were collected, cleaned, and pre-processed to remove redundancies, eliminate noise and impute missing data. In the second phase, statistical feature selection methods were applied for dimensionality reduction and for identifying useful features using various ML algorithms, after which the optimal feature set was selected. In the final phase, the dataset was divided into training and testing data, such that 75\% was training and 25\% was testing data.

We have collected 4.3 GB of data over about 52 hours during the normal traffic patterns and also while performing the attacks. Therefore, the data collected is a combination of benign and malicious traffic. The performed attacks are, DDoS, Bluesmack, and DoS on the L2CAP (Link Layer Control Adaption protocol) layer of the Bluetooth protocol stack. The L2CAP protocol is located in the data link layer of the stack, and it provides connection-less and connection oriented data services to the top layer protocols. It allows the upper level protocols and applications to send and receive the data frames.  After analyzing of the captured traffic in the pre-processing phase, 22 feature candidates were selected. 

Comments

I would need this dataset for training an anomaly detection model

Submitted by Zineb Hidila on Fri, 05/05/2023 - 05:10

I need this dataset for benchmarking anomaly detection in IoMT

Submitted by Reginald Molokwu on Mon, 06/19/2023 - 11:58

How can I get the dataset downloaded? I need it for anomaly detection

Submitted by Oluyemi Amujo on Tue, 03/05/2024 - 16:45

How can I access this dataset? I need it for my thesis on IDS detection in IOMT devices, I will also be using the CIC IoMT dataset 2024 for this purpose.

 

Submitted by Nazihah Nawreen on Thu, 10/10/2024 - 09:42