Datasets
Standard Dataset
IoTForge Pro
- Citation Author(s):
- Submitted by:
- PRADEEP KUMAR
- Last updated:
- Wed, 11/20/2024 - 06:47
- DOI:
- 10.21227/c4z1-yc52
- Data Format:
- Research Article Link:
- Links:
- License:
- Categories:
- Keywords:
Abstract
The necessity for strong security measures to fend off cyberattacks has increased due to the growing use of Industrial Internet of Things (IIoT) technologies. This research introduces IoTForge Pro, a comprehensive security testbed designed to generate a diverse and extensive intrusion dataset for IIoT environments. The testbed simulates various IIoT scenarios, incorporating network topologies and communication protocols to create realistic attack vectors and normal traffic patterns. The generated dataset, named ForgeIIOT, includes various attack types, such as denial-of-service, man-in-the-middle, ransomware, wildcard abuse and malware-based intrusions, providing a valuable resource for developing and evaluating intrusion detection systems (IDS). Additionally, we apply advanced machine learning techniques to analyze the ForgeIIOT dataset, demonstrating the effectiveness of different models in identifying and classifying various types of cyberattacks. Our experimental results highlight the potential of machine learning algorithms in enhancing the security of IIoT systems by accurately detecting anomalies and malicious activities. This research contributes to the field by offering a rich dataset and a robust framework for testing and improving IDS for IIoT, ultimately aiming to strengthen the cybersecurity posture of industrial networks.
The dataset consists of two folders: Preprocessed and Unprocessed. In the Preprocessed folder, machine learning has been applied to data containing 10 lakh samples with 96 features. The Unprocessed dataset folder contains 17 attack files named ddos_mp.csv, ddos_tcp.csv, dos_deauth.csv, dos_icmp.csv, dos_ipv4.csv, dos_land.csv, dos_udp.csv, malw_back.csv, mitm_arp.csv, mitm_dhcp.csv, mitm_ndp.csv, os_finger.csv, port_scan.csv, sybil.csv, vuln_scan.csv, wild_card.csv, and normal.csv. These files comprise 3 million samples with 159 features, plus 1 attack level.
Comments
Use it for research