Title

Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets

Document Type

Conference Proceeding

Publication Title

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

First Page

727

Last Page

735

Publisher

IEEE

School

School of Science

RAS ID

35674

Funders

UNSW Canberra

Comments

Moustafa, N., Ahmed, M., & Ahmed, M. (2020, December - 2021, January). Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets [Paper presentation]. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China. https://ieeexplore.ieee.org/document/9343084/authors#authors

Abstract

© 2020 IEEE. With the widespread of Artificial Intelligence (AI)-enabled security applications, there is a need for collecting heterogeneous and scalable data sources for effectively evaluating the performances of security applications. This paper presents the description of new datasets, named ToN_IoT datasets that include distributed data sources collected from Telemetry datasets of Internet of Things (IoT) services, Operating systems datasets of Windows and Linux, and datasets of Network traffic. The paper aims to describe the new testbed architecture used to collect Linux datasets from audit traces of hard disk, memory and process. The architecture was designed in three distributed layers of edge, fog, and cloud. The edge layer comprises IoT and network systems, the fog layer includes virtual machines and gateways, and the cloud layer includes data analytics and visualization tools connected with the other two layers. The layers were programmatically controlled using Software-Defined Network (SDN) and Network-Function Virtualization (NFV) using the VMware NSX and vCloud NFV platform. The Linux ToN_IoT datasets would be used to train and validate various new federated and distributed AI-enabled security solutions such as intrusion detection, threat intelligence, privacy preservation and digital forensics. Various Data analytical and machine learning methods are employed to determine the fidelity of the datasets in terms of examining feature engineering, statistics of legitimate and security events, and reliability of security events. The datasets can be publicly accessed from [1].

DOI

10.1109/TrustCom50675.2020.00100

Access Rights

subscription content

Research Themes

Securing Digital Futures

Priority Areas

Critical Infrastructure

Share

 
COinS