论文标题
哥谭测试床:可再现的物联网测试床,用于安全实验和数据集生成
Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation
论文作者
论文摘要
物联网(IoT)的越来越多的采用使针对这些设备的攻击大幅增加。机器学习(ML)方法已显示出有希望的入侵检测结果。但是,物联网数据集的稀缺性仍然是为IoT方案开发基于ML的安全系统的限制因素。由于IoT架构和威胁景观的发展,静态数据集变得过时了;同时,很少出版用于生成它们的测试床。本文介绍了Gotham TestBed,这是一种可再现且灵活的安全性测试床,可容纳新的模拟设备,服务或攻击者。 Gotham用于构建由MQTT,COAP和RTSP协议等通过30个开关和10个路由器组成的100个模拟设备组成的IoT方案。该方案介绍了三个威胁参与者,包括整个Mirai Botnet生命周期以及针对物联网协议的DOS,扫描和攻击的其他红色团队工具。测试床具有许多目的,包括网络范围,测试安全解决方案以及捕获网络和应用程序数据以生成数据集。我们希望研究人员能够利用和适应哥谭,包括其他设备,最先进的攻击和拓扑,以共享反映当前物联网设置和威胁景观的场景和数据集。
The growing adoption of the Internet of Things (IoT) has brought a significant increase in attacks targeting those devices. Machine learning (ML) methods have shown promising results for intrusion detection; however, the scarcity of IoT datasets remains a limiting factor in developing ML-based security systems for IoT scenarios. Static datasets get outdated due to evolving IoT architectures and threat landscape; meanwhile, the testbeds used to generate them are rarely published. This paper presents the Gotham testbed, a reproducible and flexible security testbed extendable to accommodate new emulated devices, services or attackers. Gotham is used to build an IoT scenario composed of 100 emulated devices communicating via MQTT, CoAP and RTSP protocols, among others, in a topology composed of 30 switches and 10 routers. The scenario presents three threat actors, including the entire Mirai botnet lifecycle and additional red-teaming tools performing DoS, scanning, and attacks targeting IoT protocols. The testbed has many purposes, including a cyber range, testing security solutions, and capturing network and application data to generate datasets. We hope that researchers can leverage and adapt Gotham to include other devices, state-of-the-art attacks and topologies to share scenarios and datasets that reflect the current IoT settings and threat landscape.