Open Access iconOpen Access

ARTICLE

An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

1 SER’Com Laboratory, Tunisia Polytechnic School, University of Carthage, Tunis, 2078, Tunisia
2 Computer Sciences Department, Faculty of Sciences of Tunis, University of Tunis El Manar, Tunis, 1001, Tunisia
3 Department of Science, College of Science and Theoretical Studies, Saudi Electronic University, Riyadh, 11673, Saudi Arabia
4 Computer Sciences Department, INSAT, University of Carthage, Tunis, 1080, Tunisia

* Corresponding Author: Hichem Mrabet. Email: email

(This article belongs to the Special Issue: Exploring Recent Trends and Advances in Sensors Cybersecurity)

Computers, Materials & Continua 2025, 82(3), 4535-4554. https://doi.org/10.32604/cmc.2025.060935

Abstract

The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios. The generated dataset includes five distinct classes: Normal, Probing, Remote to Local (R2L), User to Root (U2R), and Denial of Service (DoS). Furthermore, comprehensive experiments with popular Machine Learning (ML) models using various classifiers, including BayesNet, Logistic, IBK, Multiclass, PART, and J48 demonstrate high accuracy, precision, recall, and F1-scores, exceeding 0.99 across all ML metrics. The latter result is reached thanks to the rigorous applied process to achieve this quite good result, including data pre-processing, features extraction, fixing the class imbalance problem, and using a test option for model robustness. This comprehensive approach emphasizes meticulous dataset construction through a complete dataset generation process, a careful labelling algorithm, and a sophisticated evaluation method, providing valuable insights to reinforce IIoT system security. Finally, the HiTar-2024 dataset is compared with other similar datasets in the literature, considering several factors such as data format, feature extraction tools, number of features, attack categories, number of instances, and ML metrics.

Keywords

Intrusion detection system; industrial IoT; machine learning; security; cyber-attacks; dataset

Cite This Article

APA Style
Dhaouadi, T., Mrabet, H., Alhomoud, A., Jemai, A. (2025). An intrusion detection system based on hitar-2024 dataset generation from LOG files for smart industrial internet-of-things environment. Computers, Materials & Continua, 82(3), 4535–4554. https://doi.org/10.32604/cmc.2025.060935
Vancouver Style
Dhaouadi T, Mrabet H, Alhomoud A, Jemai A. An intrusion detection system based on hitar-2024 dataset generation from LOG files for smart industrial internet-of-things environment. Comput Mater Contin. 2025;82(3):4535–4554. https://doi.org/10.32604/cmc.2025.060935
IEEE Style
T. Dhaouadi, H. Mrabet, A. Alhomoud, and A. Jemai, “An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment,” Comput. Mater. Contin., vol. 82, no. 3, pp. 4535–4554, 2025. https://doi.org/10.32604/cmc.2025.060935



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 491

    View

  • 172

    Download

  • 0

    Like

Share Link