Data generation and knowledge sharing for robust intrusion detection in IoT systems

- Citation Author(s):
-
Andreas Johnsson (Uppsala University)
- Submitted by:
- Christian Rohner
- Last updated:
- DOI:
- 10.21227/3y2p-4d62
- Data Format:
- Research Article Link:
- Categories:
- Keywords:
Abstract
The data set includes attack implementations in an Internet of Things (IoT) context. The IoT nodes use Contiki-NG as their operating system and the data is collected from the Cooja simulation environment where a large number of network topologies are created. Blackhole and DIS-flooding attacks are implemented to attack the RPL routing protocol.
The datasets includes log file output from the Cooja simulator and a pre-processed feature set as input to an intrusion detection model.
Instructions:
(tbd, data will be uploaded before November 1, 2024)
Code for pre-processing, modelling and knowledge sharing: https://github.com/uu-core/iot-ids-models