ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things
Abstract
:1. Introduction
- Cyber vulnerability analysis of an off-the-shelf low-cost drone used in educational purpose.
- Risk associated of using vulnerable drones.
- Simulation of three cyber attacks on Internet of Flying Things scenario.
- Development of a benchmark dataset capturing the network traffic (Available in GitHub).
- Performance analysis of most popular anomaly detection algorithms using the developed dataset.
- Future research directions in IoFT cyber security.
2. IoFT within the Education Domain
2.1. IoFT in the Classroom
- Robolink CoDrone Lite: 8 min of flight time, Programable in Snap, Python and Blockly.
- Sky Viper e1700 Stunt: Two flight modes, Controller can be adjusted to match the best sensitivity, Auto Launch and Land.
- Ryze Tello EDU: Programable in Python, Swift and Scratch, 13 min of flight time, HD video streaming, Auto Launch and landing.
- Parrot Mambo Fly: Programmable in Blockly, Tynker, Python and JavaScript, 60 fps camera and Fly range 20 m with smart phone or 100 m with remote controller.
2.2. Cyber Risk to Students
3. ECU-IoFT Dataset Development
3.1. Environment
3.2. Cyber Attacks Launched
3.2.1. Wi-Fi Deauthentication Attack
3.2.2. WPA2-PSK Wi-Fi Cracking Attack
3.2.3. Tello API Exploit
3.3. Dataset Development
4. Anomaly Detection Using ECU-IoFT Dataset
5. Findings
6. Conclusions and Future Works
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoFT | Internet of Flying Things |
STEM | Science, Technology, Engineering and Mathematics |
IDS | Intrusion Detection Systems |
CASA | Civil Aviation Safety Authority |
API | Application Programming Interface |
PTES | Penetration Testing Execution Standard |
PSK | Pre-Shared Keys |
UAV | Unmanned Aerial Vehicles |
References
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Yaacoub, J.P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef]
- Review of Aviation Safety Regulation of Remotely Piloted Aircraft Systems by Australian Civil Aviation Safety Authority. 2018. Available online: https://consultation.casa.gov.au/regulatory-program/ (accessed on 3 January 2022).
- Zaidi, S.; Atiquzzaman, M.; Calafate, C.T. Internet of Flying Things (IoFT): A Survey. Comput. Commun. 2021, 165, 53–74. [Google Scholar] [CrossRef]
- Amazon Prime Air. 2021. Available online: https://www.amazon.com/Amazon-Prime-Air/ (accessed on 3 January 2022).
- Meet The Entrepreneurs Bringing Drones to STEM Education. 2020. Available online: https://www.forbes.com/sites/forbestechcouncil/2020/12/08/meet-the-entrepreneurs-bringing-drones-to-stem-education (accessed on 3 January 2022).
- Aerial Threat: Why Drone Hacking Could Be Bad News for the Military. 2019. Available online: https://theconversation.com/aerial-threat-why-drone-hacking-could-be-bad-news-for-the-military-124588 (accessed on 3 January 2022).
- Ahmed, M.; Byreddy, S.; Nutakki, A.; Sikos, L.F.; Haskell-Dowland, P. ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Netw. 2021, 122, 102621. [Google Scholar] [CrossRef]
- Ring, M.; Wunderlich, S.; Scheuring, D.; Landes, D.; Hotho, A. A survey of network-based intrusion detection data sets. Comput. Secur. 2019, 86, 147–167. [Google Scholar] [CrossRef] [Green Version]
- Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; pp. 1–6. [Google Scholar] [CrossRef]
- A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018). 2018. Available online: https://registry.opendata.aws/cse-cic-ids2018 (accessed on 3 January 2022).
- Whelan, J.; Sangarapillai, T.; Minawi, O.; Almehmadi, A.; El-Khatib, K. UAV Attack Dataset. Available online: https://ieee-dataport.org/open-access/uav-attack-dataset (accessed on 3 January 2022).
- Incorporating Drones into STEM Education. RobotLAB Blog. 2020. Available online: https://www.robotlab.com/blog/incorporating-drones-into-stem-education (accessed on 3 January 2022).
- Micro-Drones for STEM Education. 2019. Available online: https://sites.rmit.edu.au/cyber-physical-systems/2019/01/10/micro-drones-for-stem-education/ (accessed on 3 January 2022).
- National STEM School Education Strategy 2016–2026. Australian Goverment. 2020. Available online: https://www.dese.gov.au/australian-curriculum/support-science-technology-engineering-and-mathematics-stem/national-stem-school-education-strategy-2016-2026 (accessed on 3 January 2022).
- What Is DJI Doing for STEAM Education Around the World? DroneDJ. 2020. Available online: https://dronedj.com/2020/08/17/what-is-dji-doing-for-steam-education-around-the-world/ (accessed on 3 January 2022).
- Yamamori, K. Classroom practices of low-cost STEM education using scratch. J. Adv. Res. Soc. Sci. Humanit. 2019, 4, 192–198. [Google Scholar] [CrossRef]
- Adventures with DJI Ryze Tello: Controlling a Tello Swarm. 2018. Available online: https://medium.com/@henrymound/adventures-with-dji-ryze-tello-controlling-a-tello-swarm-1bce7d4e045d (accessed on 3 January 2022).
- Agrafiotis, I.; Nurse, J.R.C.; Goldsmith, M.; Creese, S.; Upton, D. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 2018, 4, tyy006. [Google Scholar] [CrossRef] [Green Version]
- Privacy Act 1988. Available online: https://www.legislation.gov.au/Details/C2021C00139 (accessed on 3 January 2022).
- Australian Goverment Australian Law Reform Commission, 2010. Available online: https://www.alrc.gov.au (accessed on 3 January 2022).
- Viswanathan, S.; Baig, Z. Digital Forensics for Drones: A Study of Tools and Techniques; Springer: Singapore, 2020; pp. 29–41. [Google Scholar] [CrossRef]
- Yousef, M.; Iqbal, F.; Hussain, M. Drone Forensics: A Detailed Analysis of Emerging DJI Models. In Proceedings of the 2020 11th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 7–9 April 2020; pp. 066–071. [Google Scholar] [CrossRef]
- Yaqoob, I.; Hussain, S.; Mamoon, S.; Naseer, N.; Akram, J. Penetration Testing and Vulnerability Assessment; EverScience Publications: Tamil Nadu, India, 2017. [Google Scholar]
- Rubbestad, G.; Söderqvist, W. Hacking a Wi-Fi Based Drone; DiVA Portal: Stockholm, Sweden, 2021. [Google Scholar]
- Agarwal, M.; Biswas, S.; Nandi, S. Detection of De-authentication Denial of Service attack in 802.11 networks. In Proceedings of the 2013 Annual IEEE India Conference (INDICON), Mumbai, India, 13–15 December 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Radivilova, T.; Hassan, H.A. Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise. In Proceedings of the 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), Odessa, Ukraine, 11–15 September 2017; pp. 1–4. [Google Scholar]
- Abo-Soliman, M.A.; Azer, M. A study in WPA2 enterprise recent attacks. In Proceedings of the 2017 13th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 27–28 December 2017; pp. 323–330. [Google Scholar]
- Ryze User Guide. 2018. Available online: https://dl-cdn.ryzerobotics.com/ (accessed on 3 January 2022).
- Ahmed, M.; Barkat Ullah, A.S. Infrequent pattern mining in smart healthcare environment using data summarization. J. Supercomput. 2018, 74, 5041–5059. [Google Scholar] [CrossRef]
- Rashid, A.N.M.B.; Ahmed, M.; Sikos, L.F.; Haskell-Dowland, P. Anomaly Detection in Cybersecurity Datasets via Cooperative Co-Evolution-Based Feature Selection. ACM Trans. Manage. Inf. Syst. 2022, 13, 1–39. [Google Scholar] [CrossRef]
- Ahmed, M.; Choudhury, S.; Al-Turjman, F. Big Data Analytics for Intelligent Internet of Things. In Artificial Intelligence in IoT; Al-Turjman, F., Ed.; Springer International Publishing: Cham, Switzerland, 2019; pp. 107–127. [Google Scholar]
- Ahmed, M.; Mahmood, A.N.; Hu, J. A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 2016, 60, 19–31. [Google Scholar] [CrossRef]
- Ahmed, M.; Mahmood, A.N.; Islam, M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016, 55, 278–288. [Google Scholar] [CrossRef]
- He, Z.; Xu, X.; Deng, S. Discovering cluster-based local outliers. Pattern Recognit. Lett. 2003, 24, 1641–1650. [Google Scholar] [CrossRef]
- Garg, H.; Dave, M. Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Edström, V.; Zeynalli, E. Penetration Testing a Civilian Drone: Reverse Engineering Software in Search for Security Vulnerabilities; DiVA Portal: Stockholm, Sweden, 2020. [Google Scholar]
- DJI Android GO 4 Application Security Analysis. 2020. Available online: https://www.synacktiv.com/en/publications/dji-android-go-4-application-security-analysis.html (accessed on 3 January 2022).
- Abid, R.; Iwendi, C.; Javed, A.R.; Rizwan, M.; Jalil, Z.; Anajemba, J.H.; Biamba, C. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Pers. Ubiquitous Comput. 2021, 1–14. [Google Scholar] [CrossRef]
- Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Li-li, F.W.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar] [CrossRef]
- Kumar, P.; Tripathi, R.P.; Gupta, G. P2IDF: A Privacy-Preserving Based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog). In Proceedings of the Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking, Nara, Japan, 5–8 January 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 37–42. [Google Scholar]
- Kumar, P.; Gupta, G.P.; Tripathi, R. An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 2021, 166, 110–124. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.P.; Tripathi, R. Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom. Control. Comput. Sci. 2021, 55, 137–147. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.P.; Tripathi, R. Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks. Arab. J. Sci. Eng. 2021, 46, 3749–3778. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.P.; Tripathi, R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient. Intell. Humaniz. Comput. 2020, 12, 9555–9572. [Google Scholar] [CrossRef]
Dataset | Year | Publicly Available | Traffic Type | Labelled | IoFT |
---|---|---|---|---|---|
DARPA 1998 [9] | 1998 | Yes | Emulated | Yes | No |
UNSW-NB15 [10] | 2015 | Yes | Emulated | Yes | No |
TRAbID citeRING2019147 | 2017 | Yes | Emulated | Yes | No |
CSE-CIC-IDS2018 [11] | 2018 | Yes | Real | Yes | No |
ECU-IoHT [8] | 2020 | Yes | Emulated | Yes | No |
UAV Attack [12] | 2021 | Yes | Emulated | No | Yes |
ECU-IoFT | 2022 | Yes | Real | Yes | Yes |
ID | N (%) | Time | Attack Scenario |
---|---|---|---|
1–534 | 535 (1%) | 12 September 2021: 4:34:49–4:34:49 | No Attack |
535–13,757 | 13,222 (24.3%) | 12 September 2021: 10:27:40–10:28:43 | Wi-Fi De-authentication |
13,758–54,283 | 40,526 (74.4%) | 13 September 2021: 03:04:09–03:05:49 | Wi-Fi Cracking |
54,283–54,492 | 209 (0.4%) | 13 September 2021: 03:29:20–3:29:40 | API Exploit |
Feature | Data Type | Description |
---|---|---|
ID | Integer | ID Number identifying a collected sample. |
Time | Factor | Timestamp of the collected sample. |
Source | Factor | The source address of collected sample. |
Destination | Factor | Destination address of collected sample. |
Protocol | Factor | Protocol used. |
Length | Integer | Length of the Frame in bytes. |
Info | Factor | Captured details relating to the captured sample. |
Type | Factor | Binary Classification. |
Type.of.Attack | Factor | Identifying the type of attack. |
Attack.Scenario | Factor | The attack Scenario in which the sample was collected. |
Protocol | Observation |
---|---|
802.11 | 54,280 (99.6%) |
EAPOL | 3 (close to 0%) |
ICMP | 2 (close to 0%) |
UDP | 207 (0.40%) |
Algorithm | API Exploit | Deauthentication | Cracking |
---|---|---|---|
k-NN | 100% | 2.83% | 100% |
LOF | 100% | 0% | 37.83% |
CBLOF | 100% | 100% | 81.07% |
LDCOF | 100% | 100% | 63.72% |
HBOS | 100% | 0% | 37.53% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ahmed, M.; Cox, D.; Simpson, B.; Aloufi, A. ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Appl. Sci. 2022, 12, 1990. https://doi.org/10.3390/app12041990
Ahmed M, Cox D, Simpson B, Aloufi A. ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences. 2022; 12(4):1990. https://doi.org/10.3390/app12041990
Chicago/Turabian StyleAhmed, Mohiuddin, David Cox, Benjamin Simpson, and Aseel Aloufi. 2022. "ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things" Applied Sciences 12, no. 4: 1990. https://doi.org/10.3390/app12041990
APA StyleAhmed, M., Cox, D., Simpson, B., & Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences, 12(4), 1990. https://doi.org/10.3390/app12041990