AI; ML; Industrial Internet of Things (IIoT); cybersecurity; intrusion detection; dataset

Smart grids today are characterized by the integration of distributed energy resources, including renewable energy sources, traditional power sources, and storage systems. These components typically employ various control technologies that interface with generators through smart inverters, making them susceptible to numerous cyber threats. To address this vulnerability, there is a crucial need for datasets that document attacks on these systems, enabling risk evaluation and the development of effective monitoring algorithms. This dataset

Categories:
162 Views

16.00

Normal
0

false
false
false

EN-GB
X-NONE
X-NONE

Categories:
266 Views

SCVIC-CIDS-2021 was created using the raw data in CIC-IDS-2018*, while this new dataset, SCVIC-CIDS-2022 is formed from NDSec-1** meta-data by following a similar procedure.

 This dataset has been used in the following work:

J. Liu, M. Simsek, B. Kantarci, M. Bagheri, P. Djukic, "Bridging Networks and Hosts via Machine Learning-Based Intrusion Detection"; under review in IEEE Transactions on Dependable and Secure Computing.

 

Categories:
988 Views

SCVIC-CIDS-2021 is a novel dataset that combines network- and host-based data.

 

SCVIC-CIDS-2021 is derived from the meta-data (i.e., network packets, system logs and labeling information) from the well-known benchmark dataset, CIC-IDS-2018 (Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018 ) .

 

Categories:
861 Views

It is now widely known fact that the Cloud computing and Software defined network paradigms have received a wide acceptance from researchers, academia and the industry. But the wider acceptance of cloud computing and SDN paradigms are hampered by increasing security threats. One of the several facts is that the advancements in processing facilities currently available are implicitly helping the attackers to attack in various directions. For example, it is visible that the conventional DoS attacks are now extended to cloud environments as DDoS attacks.

Categories:
3491 Views

We elaborate on the dataset collected from our testbed developed at Washington University in St. Louis, to perform real-world IIoT operations, carrying out attacks that are more prelevant against IIoT systems. This dataset is to be utilized in the research of AI/ML based security solutions to tackle the intrusion problem.

Categories:
2584 Views