Large-scale Urban IoT Activity Data for DDoS Attack Emulation

12Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

Abstract

As IoT deployments grow in scale for applications such as smart cities, they face increasing cyber-security threats. In particular, as evidenced by the famous Mirai incident and other ongoing threats, large-scale IoT device networks are particularly susceptible to being hijacked and used as botnets to launch distributed denial of service (DDoS) attacks. Real large-scale datasets are needed to train and evaluate the use of machine learning algorithms such as deep neural networks to detect and defend against such DDoS attacks. We present a dataset from an urban IoT deployment of 4060 nodes describing their spatio-temporal activity under benign conditions. We also provide a synthetic DDoS attack generator that injects attack activity into the dataset based on tunable parameters such as number of nodes attacked and duration of attack. We discuss some of the features of the dataset. We also demonstrate the utility of the dataset as well as our synthetic DDoS attack generator by using them for the training and evaluation of a simple multi-label feed-forward neural network that aims to identify which nodes are under attack and when.

Cite

CITATION STYLE

APA

Hekmati, A., Grippo, E., & Krishnamachari, B. (2021). Large-scale Urban IoT Activity Data for DDoS Attack Emulation. In SenSys 2021 - Proceedings of the 2021 19th ACM Conference on Embedded Networked Sensor Systems (pp. 560–564). Association for Computing Machinery, Inc. https://doi.org/10.1145/3485730.3493695

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free