Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, Reginald Chukwuka Molokwu, Somayeh Sadeghi, Ali A. Ghorbani
{"title":"CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT","authors":"Sajjad Dadkhah, Euclides Carlos Pinto Neto, Raphael Ferreira, Reginald Chukwuka Molokwu, Somayeh Sadeghi, Ali A. Ghorbani","doi":"10.1016/j.iot.2024.101351","DOIUrl":null,"url":null,"abstract":"<div><p>The Internet of Things (IoT) is increasingly integrated into daily life, particularly in healthcare, through the Internet of Medical Things (IoMT). IoMT devices support services like continuous health monitoring but raise significant cybersecurity concerns due to their vulnerability to various attacks. The complexity and data volume of IoMT network traffic requires advanced methods to enhance security and reliability. Machine Learning (ML) offers techniques to detect, prevent, and mitigate cyberattacks. However, existing benchmark datasets lack essential features for robust IoMT security solutions, such as a reduced number of real devices, a limited variety of attacks, and a lack of extensive profiling. We propose a realistic benchmark dataset for IoMT security solutions development and evaluation to address these gaps. We executed 18 attacks on an IoMT testbed with 40 devices (25 real and 15 simulated), using protocols like Wi-Fi, MQTT, and Bluetooth. Supporting technologies, including dedicated network traffic collectors and a Faraday Cage, ensured data quality. The attacks fall into five categories: DDoS, DoS, Recon, MQTT, and spoofing. We aim to establish a baseline that complements existing datasets, aiding researchers in creating secure healthcare systems using ML. Beyond simulating attacks, we capture the lifecycle of IoMT devices from network entry to exit through profiling, allowing classifiers to identify device anomalies. The resulting <span><span>CICIoMT2024</span><svg><path></path></svg></span> dataset, published on the CIC dataset page, demonstrates that various methods can classify IoMT cyberattacks. This effort supports new IoMT security solutions and contributes to the broader field of cybersecurity in healthcare, ensuring more reliable IoMT device deployment.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101351"},"PeriodicalIF":6.0000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002920/pdfft?md5=0430302d374a16cfc8032840ccdad749&pid=1-s2.0-S2542660524002920-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524002920","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) is increasingly integrated into daily life, particularly in healthcare, through the Internet of Medical Things (IoMT). IoMT devices support services like continuous health monitoring but raise significant cybersecurity concerns due to their vulnerability to various attacks. The complexity and data volume of IoMT network traffic requires advanced methods to enhance security and reliability. Machine Learning (ML) offers techniques to detect, prevent, and mitigate cyberattacks. However, existing benchmark datasets lack essential features for robust IoMT security solutions, such as a reduced number of real devices, a limited variety of attacks, and a lack of extensive profiling. We propose a realistic benchmark dataset for IoMT security solutions development and evaluation to address these gaps. We executed 18 attacks on an IoMT testbed with 40 devices (25 real and 15 simulated), using protocols like Wi-Fi, MQTT, and Bluetooth. Supporting technologies, including dedicated network traffic collectors and a Faraday Cage, ensured data quality. The attacks fall into five categories: DDoS, DoS, Recon, MQTT, and spoofing. We aim to establish a baseline that complements existing datasets, aiding researchers in creating secure healthcare systems using ML. Beyond simulating attacks, we capture the lifecycle of IoMT devices from network entry to exit through profiling, allowing classifiers to identify device anomalies. The resulting CICIoMT2024 dataset, published on the CIC dataset page, demonstrates that various methods can classify IoMT cyberattacks. This effort supports new IoMT security solutions and contributes to the broader field of cybersecurity in healthcare, ensuring more reliable IoMT device deployment.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.