Open Access iconOpen Access

ARTICLE

MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

1 Department of Artificial Intelligence, People’s Public Security University of China, Beijing, 100038, China
2 Department of Cybersecurity, People’s Public Security University of China, Beijing, 100038, China

* Corresponding Author: Yanhui Du. Email: email

Computers, Materials & Continua 2023, 76(2), 2095-2119. https://doi.org/10.32604/cmc.2023.039980

Abstract

Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT devices as DDoS attackers in the construction process, while they did not use Internet applications as victims either. To supplement the description of the new trend of DDoS attacks in the dataset, we built an IoT environment with mainstream DDoS attack tools such as Mirai and BASHLITE being used to infect IoT devices and implement DDoS attacks against WEB servers. Then, data aggregated into a dataset named MBB-IoT were captured at WEB servers and IoT nodes. After the MBB-IoT dataset was split into a training set and a test set, it was applied to the training and testing of the Random Forests classification algorithm. The multi-class classification metrics were good and all above 90%. Secondly, in a cross-evaluation experiment based on Support Vector Machine (SVM), Light Gradient Boosting Machine (LightGBM), and Long Short Term Memory networks (LSTM) classification algorithms, the training set and test set were derived from different datasets (MBB-IoT or IoT-23), and the test performance is better when MBB-IoT is used as the training set.

Keywords


Cite This Article

APA Style
Qing, Y., Liu, X., Du, Y. (2023). Mbb-iot: construction and evaluation of iot ddos traffic dataset from a new perspective. Computers, Materials & Continua, 76(2), 2095-2119. https://doi.org/10.32604/cmc.2023.039980
Vancouver Style
Qing Y, Liu X, Du Y. Mbb-iot: construction and evaluation of iot ddos traffic dataset from a new perspective. Comput Mater Contin. 2023;76(2):2095-2119 https://doi.org/10.32604/cmc.2023.039980
IEEE Style
Y. Qing, X. Liu, and Y. Du, “MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective,” Comput. Mater. Contin., vol. 76, no. 2, pp. 2095-2119, 2023. https://doi.org/10.32604/cmc.2023.039980



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 943

    View

  • 446

    Download

  • 2

    Like

Share Link