{"title":"生成大规模IoT-Zwave入侵检测数据集:智能设备分析,入侵者行为和流量表征","authors":"MohammadMoein Shafi , Arash Habibi Lashkari","doi":"10.1016/j.iot.2025.101747","DOIUrl":null,"url":null,"abstract":"<div><div>The rapid expansion of the Internet of Things (IoT) has introduced critical security challenges, making IoT ecosystems a prime target for cyber threats. Traditional security measures, relying on predefined signatures and static rules, struggle to detect sophisticated attacks that evolve dynamically. While machine learning and deep learning have improved IoT security, their effectiveness is fundamentally limited by the quality and diversity of available datasets. Existing IoT security datasets suffer from numerous shortcomings, including limited device diversity, inadequate threat coverage, the absence of real-world user and environment interaction, a lack of IoT-specific attacks, insufficient data volume, outdated threat scenarios, a lack of multimodal data, and a lack of support for multi-protocol analysis. To bridge this gap, we conducted a comprehensive analysis of the top 30 publicly available IoT smart home datasets, identifying 22 critical shortcomings that hinder their applicability in security research. To address these limitations, we introduce BCCC-IoT-IDS-Zwave-2025, the most extensive and diverse IoT smart home dataset to date, developed over five months using a large-scale testbed comprising more than 50 IoT devices and encompassing over 80 distinct attack scenarios. Unlike prior datasets that focus primarily on IP network-layer traffic, our dataset integrates multi-source data, including IP-based network traffic, IoT-Zwave communication signals, device activity, and MQTT-based traffic and logs, with attack scenarios specifically designed for each data source, enabling a holistic view of IoT threats. To further enhance IoT threat analysis, we developed IoT-ZwaveNetLyzer, the first dedicated traffic analyzer for Z-Wave networks, addressing the gap left by traditional PC-focused tools. Extensive experimental evaluations demonstrate the dataset’s effectiveness, with state-of-the-art classifiers achieving an average detection accuracy exceeding 95% and a false positive rate as low as 2.2% on average, establishing BCCC-IoT-IDS-Zwave-2025 as a cornerstone for future IoT security research and the development of advanced detection methodologies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101747"},"PeriodicalIF":7.6000,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Toward generating a large-scale IoT-Zwave intrusion detection dataset: Smart device profiling, intruders behavior, and traffic characterization\",\"authors\":\"MohammadMoein Shafi , Arash Habibi Lashkari\",\"doi\":\"10.1016/j.iot.2025.101747\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The rapid expansion of the Internet of Things (IoT) has introduced critical security challenges, making IoT ecosystems a prime target for cyber threats. Traditional security measures, relying on predefined signatures and static rules, struggle to detect sophisticated attacks that evolve dynamically. While machine learning and deep learning have improved IoT security, their effectiveness is fundamentally limited by the quality and diversity of available datasets. Existing IoT security datasets suffer from numerous shortcomings, including limited device diversity, inadequate threat coverage, the absence of real-world user and environment interaction, a lack of IoT-specific attacks, insufficient data volume, outdated threat scenarios, a lack of multimodal data, and a lack of support for multi-protocol analysis. To bridge this gap, we conducted a comprehensive analysis of the top 30 publicly available IoT smart home datasets, identifying 22 critical shortcomings that hinder their applicability in security research. To address these limitations, we introduce BCCC-IoT-IDS-Zwave-2025, the most extensive and diverse IoT smart home dataset to date, developed over five months using a large-scale testbed comprising more than 50 IoT devices and encompassing over 80 distinct attack scenarios. Unlike prior datasets that focus primarily on IP network-layer traffic, our dataset integrates multi-source data, including IP-based network traffic, IoT-Zwave communication signals, device activity, and MQTT-based traffic and logs, with attack scenarios specifically designed for each data source, enabling a holistic view of IoT threats. To further enhance IoT threat analysis, we developed IoT-ZwaveNetLyzer, the first dedicated traffic analyzer for Z-Wave networks, addressing the gap left by traditional PC-focused tools. Extensive experimental evaluations demonstrate the dataset’s effectiveness, with state-of-the-art classifiers achieving an average detection accuracy exceeding 95% and a false positive rate as low as 2.2% on average, establishing BCCC-IoT-IDS-Zwave-2025 as a cornerstone for future IoT security research and the development of advanced detection methodologies.</div></div>\",\"PeriodicalId\":29968,\"journal\":{\"name\":\"Internet of Things\",\"volume\":\"34 \",\"pages\":\"Article 101747\"},\"PeriodicalIF\":7.6000,\"publicationDate\":\"2025-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2542660525002616\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525002616","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Toward generating a large-scale IoT-Zwave intrusion detection dataset: Smart device profiling, intruders behavior, and traffic characterization
The rapid expansion of the Internet of Things (IoT) has introduced critical security challenges, making IoT ecosystems a prime target for cyber threats. Traditional security measures, relying on predefined signatures and static rules, struggle to detect sophisticated attacks that evolve dynamically. While machine learning and deep learning have improved IoT security, their effectiveness is fundamentally limited by the quality and diversity of available datasets. Existing IoT security datasets suffer from numerous shortcomings, including limited device diversity, inadequate threat coverage, the absence of real-world user and environment interaction, a lack of IoT-specific attacks, insufficient data volume, outdated threat scenarios, a lack of multimodal data, and a lack of support for multi-protocol analysis. To bridge this gap, we conducted a comprehensive analysis of the top 30 publicly available IoT smart home datasets, identifying 22 critical shortcomings that hinder their applicability in security research. To address these limitations, we introduce BCCC-IoT-IDS-Zwave-2025, the most extensive and diverse IoT smart home dataset to date, developed over five months using a large-scale testbed comprising more than 50 IoT devices and encompassing over 80 distinct attack scenarios. Unlike prior datasets that focus primarily on IP network-layer traffic, our dataset integrates multi-source data, including IP-based network traffic, IoT-Zwave communication signals, device activity, and MQTT-based traffic and logs, with attack scenarios specifically designed for each data source, enabling a holistic view of IoT threats. To further enhance IoT threat analysis, we developed IoT-ZwaveNetLyzer, the first dedicated traffic analyzer for Z-Wave networks, addressing the gap left by traditional PC-focused tools. Extensive experimental evaluations demonstrate the dataset’s effectiveness, with state-of-the-art classifiers achieving an average detection accuracy exceeding 95% and a false positive rate as low as 2.2% on average, establishing BCCC-IoT-IDS-Zwave-2025 as a cornerstone for future IoT security research and the development of advanced detection methodologies.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.