{"id":"https://openalex.org/W6907341074","doi":"https://doi.org/10.21227/s7h0-b081","title":"DNP3 Intrusion Detection Dataset","display_name":"DNP3 Intrusion Detection Dataset","publication_year":2022,"publication_date":"2022-11-22","ids":{"openalex":"https://openalex.org/W6907341074","doi":"https://doi.org/10.21227/s7h0-b081"},"language":"en","primary_location":{"id":"doi:10.21227/s7h0-b081","is_oa":true,"landing_page_url":"https://doi.org/10.21227/s7h0-b081","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/s7h0-b081","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Radoglou-Grammatikis, Panagiotis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Radoglou-Grammatikis, Panagiotis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kelli, Vasiliki","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kelli, Vasiliki","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Lagkas, Thomas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lagkas, Thomas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Argyriou, Vasileios","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Argyriou, Vasileios","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Sarigiannidis, Panagiotis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sarigiannidis, Panagiotis","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/modbus","display_name":"Modbus","score":0.7996000051498413},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6614000201225281},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.5188999772071838},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5157999992370605},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47099998593330383},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4521999955177307},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44769999384880066},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.4449000060558319},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4142000079154968}],"concepts":[{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.7996000051498413},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6614000201225281},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.583299994468689},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5698000192642212},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.5188999772071838},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5157999992370605},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47099998593330383},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44769999384880066},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.4449000060558319},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4142000079154968},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.38749998807907104},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.36820000410079956},{"id":"https://openalex.org/C33588617","wikidata":"https://www.wikidata.org/wiki/Q8803","display_name":"Transmission Control Protocol","level":3,"score":0.35989999771118164},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3440999984741211},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.3402000069618225},{"id":"https://openalex.org/C86338984","wikidata":"https://www.wikidata.org/wiki/Q79708","display_name":"General Packet Radio Service","level":3,"score":0.31929999589920044},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.30959999561309814},{"id":"https://openalex.org/C148108848","wikidata":"https://www.wikidata.org/wiki/Q17156884","display_name":"Port Control Protocol","level":5,"score":0.30090001225471497},{"id":"https://openalex.org/C121308736","wikidata":"https://www.wikidata.org/wiki/Q149918","display_name":"Communications satellite","level":3,"score":0.28870001435279846},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27720001339912415},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C192835768","wikidata":"https://www.wikidata.org/wiki/Q194134","display_name":"Data link layer","level":4,"score":0.2711000144481659},{"id":"https://openalex.org/C7345512","wikidata":"https://www.wikidata.org/wiki/Q209372","display_name":"Transport layer","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C153043593","wikidata":"https://www.wikidata.org/wiki/Q727896","display_name":"Connectionless communication","level":3,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/s7h0-b081","is_oa":true,"landing_page_url":"https://doi.org/10.21227/s7h0-b081","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/s7h0-b081","is_oa":true,"landing_page_url":"https://doi.org/10.21227/s7h0-b081","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6786926984786987,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,63],"the":[1,5,11,41,58,61,67,95,122],"digital":[2],"era":[3],"of":[4,8,44,60,98,101,202],"Industrial":[6,71],"Internet":[7,170],"Things":[9],"(IIoT),":[10],"conventional":[12],"Critical":[13],"Infrastructures":[14],"(CIs)":[15],"are":[16,194,209],"transformed":[17],"into":[18,121],"smart":[19],"environments":[20],"with":[21],"multiple":[22],"benefits,":[23],"such":[24,87],"as":[25,88,129],"pervasive":[26],"control,":[27],"self-monitoring":[28],"and":[29,75,78,92,110,141,181,200,229,239],"self-healing.":[30],"However,":[31,115,133],"this":[32,217],"evolution":[33],"is":[34,48,54,145],"characterised":[35,146],"by":[36,147],"several":[37],"cyberthreats":[38],"due":[39],"to":[40,135,188,222],"necessary":[42],"presence":[43],"insecure":[45],"technologies.":[46],"DNP3":[47,65,99,116,144,182,190,197],"an":[49,130],"industrial":[50,137],"communication":[51,69],"protocol":[52],"which":[53],"widely":[55],"adopted":[56],"in":[57],"CIs":[59],"US.":[62],"particular,":[64],"allows":[66],"remote":[68],"between":[70],"Control":[72,77,124,166],"Systems":[73],"(ICS)":[74],"Supervisory":[76],"Data":[79,112],"Acquisition":[80],"(SCADA).":[81],"It":[82],"can":[83,117,219],"support":[84],"various":[85],"topologies,":[86],"Master-Slave,":[89],"Multi-Drop,":[90],"Hierarchical":[91],"Multiple-Server.":[93],"Initially,":[94],"architectural":[96],"model":[97],"consists":[100],"three":[102],"layers:":[103],"(a)":[104],"Application":[105],"Layer,":[106],"(b)":[107],"Transport":[108],"Layer":[109],"(c)":[111],"Link":[113],"Layer.":[114],"be":[118,220],"now":[119],"incorporated":[120],"Transmission":[123,165],"Protocol/Internet":[125],"Protocol":[126,167,171],"(TCP/IP)":[127],"stack":[128],"application-layer":[131],"protocol.":[132],"similarly":[134],"other":[136],"protocols":[138],"(e.g.,":[139],"Modbus":[140],"IEC":[142],"60870-5-104),":[143],"severe":[148],"security":[149],"issues":[150],"since":[151],"it":[152],"does":[153],"not":[154],"include":[155],"any":[156],"authentication":[157],"or":[158],"authorisation":[159],"mechanisms.":[160],"This":[161],"dataset":[162,218],"contains":[163],"labelled":[164],"(TCP)":[168],"/":[169],"(IP)":[172],"network":[173,206],"flow":[174,183],"statistics":[175,184],"(Common-Separated":[176],"Values":[177],"-":[178],"CSV":[179],"format)":[180,186],"(CSV":[185],"related":[187],"9":[189],"cyberattacks.":[191],"These":[192],"cyberattacks":[193],"focused":[195],"on":[196,235],"unauthorised":[198],"commands":[199],"Denial":[201],"Service":[203],"(DoS).":[204],"The":[205],"traffic":[207],"data":[208],"provided":[210],"through":[211],"Packet":[212],"Capture":[213],"(PCAP)":[214],"files.":[215],"Consequently,":[216],"used":[221],"implement":[223],"Artificial":[224],"Intelligence":[225],"(AI)-powered":[226],"Intrusion":[227],"Detection":[228],"Prevention":[230],"(IDPS)":[231],"systems":[232],"that":[233],"rely":[234],"Machine":[236],"Learning":[237,241],"(ML)":[238],"Deep":[240],"(DL)":[242],"techniques":[243]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
