The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this challenge, realistic protection and investigation countermeasures, such as network intrusion detection and network forensic systems, need to be effectively developed. For this purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems. Although there are several network datasets, in most cases, not much information is given about the Botnet scenarios that were used.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

Documentation: 
[1] Nour Moustafa, "The Bot-IoT dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/r7v2-x988. Accessed: Jan. 15, 2025.
@data{r7v2-x988-19,
doi = {10.21227/r7v2-x988},
url = {http://dx.doi.org/10.21227/r7v2-x988},
author = {Nour Moustafa },
publisher = {IEEE Dataport},
title = {The Bot-IoT dataset},
year = {2019} }
TY - DATA
T1 - The Bot-IoT dataset
AU - Nour Moustafa
PY - 2019
PB - IEEE Dataport
UR - 10.21227/r7v2-x988
ER -
Nour Moustafa. (2019). The Bot-IoT dataset. IEEE Dataport. http://dx.doi.org/10.21227/r7v2-x988
Nour Moustafa, 2019. The Bot-IoT dataset. Available at: http://dx.doi.org/10.21227/r7v2-x988.
Nour Moustafa. (2019). "The Bot-IoT dataset." Web.
1. Nour Moustafa. The Bot-IoT dataset [Internet]. IEEE Dataport; 2019. Available from : http://dx.doi.org/10.21227/r7v2-x988
Nour Moustafa. "The Bot-IoT dataset." doi: 10.21227/r7v2-x988