An Automatic Complex Event Processing Rules Generation System for the Recognition of Real-Time IoT Attack Patterns (Dataset)

Published: 29 November 2023| Version 1 | DOI: 10.17632/f6sknjshzy.1
Contributor:
José Roldán-Gómez

Description

The dataset contains data from different attacks on an IoT network. In addition to data on the legitimate traffic of the network. You can also find the CEP rules used to detect attacks. This dataset has been used in the work : "An Automatic Complex Event Processing Rules Generation System for the Recognition of Real-Time IoT Attack Patterns". The distribution between training and testing is as follows: Normal: 20% training, 80% testing Subscription fuzzing: 20% training, 80% testing Disconnection wave: 20%training, 80% testing TCP SYN Scan: 70% training, 30% testing UDP port Scan: 70% training, 30% testing XMAS Scan: 90% training, 10% testing Telnet Connection: 70% training, 30% testing

Files

Steps to reproduce

1: Run the Siddhi CEP engine 2: Deploy the event patterns (.siddhi) in the corresponding CEP engine 3: Send the datasets to the CEP engine

Institutions

Universidad de Castilla-La Mancha - Campus de Albacete

Categories

Security

Licence