Data
Viewed: [[ro.stat.viewed]] Cited: [[ro.stat.cited]] Accessed: [[ro.stat.accessed]]
ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rfr_id=info%3Asid%2FANDS&rft_id=info:doi10.25958/5f1f97b837aca&rft.title=ECU-IoHT&rft.identifier=10.25958/5f1f97b837aca&rft.publisher=Edith Cowan University&rft.description=In recent times, cyberattacks on Internet of Health Things (IoHT) have continuously been growing, and so it is important to develop robust countermeasures. However, there is a lack of publicly available datasets reflecting cyberattacks on IoHT, mainly due to privacy concerns. To strengthen the cyber security of IoHT, we have developed the dataset, named ECU-IoHT, that is built upon an IoHT environment having different attacks performed that exploit various vulnerabilities. This dataset was designed to help the healthcare security community in analyzing attack behaviour and developing robust countermeasures. To the best of our knowledge, no other publicly available datasets have been released for cybersecurity in this domain.&rft.creator=Anush Nutakki&rft.creator=Leslie Sikos&rft.creator=Mohiuddin Ahmed&rft.creator=Paul Haskell-Dowland&rft.creator=Surender Byreddy&rft.date=2021&rft.relation=https://doi.org/10.1016/j.adhoc.2021.102621 target=_blank&rft_rights= http://creativecommons.org/licenses/by-nc-nd/4.0/&rft_subject=Health Information Technology&rft_subject=Information Security&rft.type=dataset&rft.language=English Access the data

Licence & Rights:

Non-Derivative Licence view details

Access:

Open

Contact Information

Mohi Ahmed: mohiuddin.ahmed@ecu.edu.au

Full description

In recent times, cyberattacks on Internet of Health Things (IoHT) have continuously been growing, and so it is important to develop robust countermeasures. However, there is a lack of publicly available datasets reflecting cyberattacks on IoHT, mainly due to privacy concerns. To strengthen the cyber security of IoHT, we have developed the dataset, named ECU-IoHT, that is built upon an IoHT environment having different attacks performed that exploit various vulnerabilities. This dataset was designed to help the healthcare security community in analyzing attack behaviour and developing robust countermeasures. To the best of our knowledge, no other publicly available datasets have been released for cybersecurity in this domain.

Click to explore relationships graph
Subjects

User Contributed Tags    

Login to tag this record with meaningful keywords to make it easier to discover

Identifiers