首页    期刊浏览 2024年10月05日 星期六
登录注册

文章基本信息

  • 标题:The Comparison of Cybersecurity Datasets
  • 本地全文:下载
  • 作者:Ahmed Alshaibi ; Mustafa Al-Ani ; Abeer Al-Azzawi
  • 期刊名称:Data
  • 印刷版ISSN:2306-5729
  • 出版年度:2022
  • 卷号:7
  • 期号:2
  • 页码:1-18
  • DOI:10.3390/data7020022
  • 语种:English
  • 出版社:MDPI Publishing
  • 摘要:Almost all industrial internet of things (IIoT) attacks happen at the data transmission layeraccording to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL)techniques are used for building the intrusion detection system (IDS) and models to detect the attacksin any layer of its architecture. In this regard, minimizing the attacks could be the major objective ofcybersecurity, while knowing that they cannot be fully avoided. The number of people resisting theattacks and protection system is less than those who prepare the attacks. Well-reasoned and learningbacked problems must be addressed by the cyber machine, using appropriate methods alongsidequality datasets. The purpose of this paper is to describe the development of the cybersecuritydatasets used to train the algorithms which are used for building IDS detection models, as well asanalyzing and summarizing the different and famous internet of things (IoT) attacks. This is carriedout by assessing the outlines of various studies presented in the literature and the many problemswith IoT threat detection. Hybrid frameworks have shown good performance and high detectionrates compared to standalone machine learning methods in a few experiments. It is the researchers’recommendation to employ hybrid frameworks to identify IoT attacks for the foreseeable future.
  • 关键词:cybersecurity;network security;datasets;machine learning;cyberattacks;IoT
国家哲学社会科学文献中心版权所有