eBiltegia

    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
    • Euskara
    • Español
    • English

xmlui.dri2xhtml.structural.fecyt

  • Contact Us
  • English 
    • Euskara
    • Español
    • English
  • About eBiltegia  
    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
  • Login
View Item 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-LiburuEtaKapituluak
  • LiburuEtaKapituluak-Ingeniaritza
  • View Item
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-LiburuEtaKapituluak
  • LiburuEtaKapituluak-Ingeniaritza
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
View/Open
Practical_approaches_towards_IoT_dataset_generation_for_security_experiments__MU_IKERLAN_preprint.pdf (2.758Mb)
Full record
Impact

Web of Science   

Google Scholar
Share
EmailLinkedinFacebookTwitter
Save the reference
Mendely

Zotero

untranslated

Mets

Mods

Rdf

Marc

Exportar a BibTeX
Title
Practical approaches towards IoT dataset generation for security experiments
Author
Sáez de Cámara Garcia, Xabier
Flores Barroso, Jose Luis
Arellano Bartolomé, Cristóbal
Urbieta Artetxe, Aitor
Garitano, Iñaki
Zurutuza, Urko
Research Group
Análisis de datos y ciberseguridad
Other institutions
Ikerlan
Version
Preprint
Rights
© 2025 Elsevier Inc
Access
Embargoed access
URI
https://hdl.handle.net/20.500.11984/13900
Publisher’s version
https://doi.org/10.1016/B978-0-44-329032-9.00017-8
Published at
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks  Chapter 12
Publisher
Elsevier
Keywords
Botnet
Emulation
Internet of Things
Machine learning ... [+]
Botnet
Emulation
Internet of Things
Machine learning
Network security
testbed
ODS 4 Educación de calidad
ODS 9 Industria, innovación e infraestructura [-]
Subject (UNESCO Thesaurus)
Data protection
Abstract
The cybersecurity field has been steadily adopting rapid advances in artificial intelligence (AI) and machine learning (ML) techniques for various purposes, such as threat detection and response, with ... [+]
The cybersecurity field has been steadily adopting rapid advances in artificial intelligence (AI) and machine learning (ML) techniques for various purposes, such as threat detection and response, with promising results. Obtaining high-quality data for model training is fundamental to creating robust solutions; however, the scarcity of IoT security datasets remains a limiting factor in developing ML-based security systems for IoT scenarios. Broadly, there are two methods for generating datasets: using physical IoT hardware on operational networks and employing virtualization-based systems. The former provides accurate and representative data but can be costly, time-consuming, difficult to adapt, and potentially risky. On the other hand, the latter offers a safer, more flexible, and cost-effective approach for various research purposes, despite not replicating exact hardware conditions. This chapter will delve into the practical process of dataset generation from the point of view of these two approaches. First, regarding the virtualized approach, we will leverage the recently published Gotham testbed, a reproducible, flexible, and extendable security testbed based on emulated nodes that mixes containerization and virtual machine technologies. This testbed can be used to generate various datasets of network traces, including activities from real malware emulated in the platform or real attack activities from the internet interacting with the testbed. Then, based on the VARIoT project, we will explore the platform and methodology to create datasets of IoT traffic under realistic conditions, including both legitimate and malicious traces, using a laboratory set of physical IoT hardware devices. [-]
Collections
  • Books and chapters - Engineering [54]

Browse

All of eBiltegiaCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished atThis CollectionBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished at

My Account

LoginRegister

Statistics

View Usage Statistics

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace
 

 

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace