IEEE/ICACT20220314 Slide.05        [Big Slide]       [YouTube] Oral Presentation
Next, we will talk about the problem statement. Firstly, we reviewed the weaknesses in various intrusion detection datasets. Secondly, we designed the IoT testbed for AIoT-Sol Dataset Generation. Thirdly, we provided a ˇ°attack and riskˇ± mapping based on the OWASP IoT Top 10 Attacks. And also, we tried to encompass the dynamics and characteristics of real-world attacks. The dataset will be available at the given link below.

[Go to Next Slide]
Select Voice: