IoTForge Pro

Citation Author(s):
Pradeep
Kumar
Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India
Suvrajit
Mullick
Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India
Rajdeep
Das
Department of Computer Science and Business Systems Institute of Engineering and Management Kolkata, India
Ayushman
Nandi
Department of Computer Science and Business Systems Institute of Engineering and Management Kolkata, India
Indrajit
Banerjee
Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur, India
Submitted by:
PRADEEP KUMAR
Last updated:
Wed, 11/20/2024 - 06:47
DOI:
10.21227/c4z1-yc52
Data Format:
Research Article Link:
Links:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

The necessity for strong security measures to fend off cyberattacks has increased due to the growing use of Industrial Internet of Things (IIoT) technologies. This research introduces IoTForge Pro, a comprehensive security testbed designed to generate a diverse and extensive intrusion dataset for IIoT environments. The testbed simulates various IIoT scenarios, incorporating network topologies and communication protocols to create realistic attack vectors and normal traffic patterns. The generated dataset, named ForgeIIOT, includes various attack types, such as denial-of-service, man-in-the-middle, ransomware, wildcard abuse and malware-based intrusions, providing a valuable resource for developing and evaluating intrusion detection systems (IDS). Additionally, we apply advanced machine learning techniques to analyze the ForgeIIOT dataset, demonstrating the effectiveness of different models in identifying and classifying various types of cyberattacks. Our experimental results highlight the potential of machine learning algorithms in enhancing the security of IIoT systems by accurately detecting anomalies and malicious activities. This research contributes to the field by offering a rich dataset and a robust framework for testing and improving IDS for IIoT, ultimately aiming to strengthen the cybersecurity posture of industrial networks.

Instructions: 

The dataset consists of two folders: Preprocessed and Unprocessed. In the Preprocessed folder, machine learning has been applied to data containing 10 lakh samples with 96 features. The Unprocessed dataset folder contains 17 attack files named ddos_mp.csv, ddos_tcp.csv, dos_deauth.csv, dos_icmp.csv, dos_ipv4.csv, dos_land.csv, dos_udp.csv, malw_back.csv, mitm_arp.csv, mitm_dhcp.csv, mitm_ndp.csv, os_finger.csv, port_scan.csv, sybil.csv, vuln_scan.csv, wild_card.csv, and normal.csv. These files comprise 3 million samples with 159 features, plus 1 attack level.

Comments

Use it for research

Submitted by Robert Wamusi on Mon, 11/25/2024 - 09:44