ToN_IoT datasets

0
0 ratings - Please login to submit your rating.

Abstract 

Collecting and analysing heterogeneous data sources from the Internet of Things (IoT) and Industrial IoT (IIoT) are essential for training and validating the fidelity of cybersecurity applications-based machine learning.  However, the analysis of those data sources is still a big challenge for reducing high dimensional space and selecting important features and observations from different data sources. The study proposes a new testbed for an IIoT network that was utilised for creating new datasets called TON_IoT that collected Telemetry data, Operating systems data and Network data. The testbed is deployed using multiple virtual machines including hosts of windows, Linux and Kali Linux operating systems to manage the interconnections between the three layers of IIoT, Cloud and Edge/Fog systems. The initial statistical evaluation of the datasets reveals their capability for evaluating cybersecurity applications such as intrusion detection, threat intelligence, adversarial machine learning and privacy-preserving models. 

Instructions: 

The TON_IoT datasets are new generations of Internet of Things (IoT) and Industrial

IoT (IIoT) datasets for evaluating the fidelity and efficiency of different cybersecurity

applications based on Artificial Intelligence (AI). The datasets have been called

‘ToN_IoT’ as they include heterogeneous data sources collected from Telemetry

datasets of IoT and IIoT sensors, Operating systems datasets of Windows 7 and 10

as well as Ubuntu 14 and 18 TLS and Network traffic datasets. The datasets were

collected from a realistic and large-scale network designed at the IoT Lab of the UNSW

Canberra Cyber, the School of Engineering and Information technology (SEIT), UNSW

Canberra @ the Australian Defence Force Academy (ADFA). The datasets were

gathered in a parallel processing to collect several normal and cyber-attack events

from IoT networks. A new testbed was developed at the IoT lab to connect many virtual

machine, physical systems, hacking platforms, cloud and fog platforms, IoT and IIoT

sensors to mimic the complexity and scalability of industrial IoT and Industry 4.0

networks.

Different hacking techniques, such as DoS, DDoS and ransomware against, were

launched against web applications, IoT gateways and computer systems across the

IIoT network. 

Comments

The AWS URIs are not available for these datasets. Are there other ways to access them?

Submitted by Najwa Laabid on Mon, 11/02/2020 - 07:24

How can i download this data set

Submitted by saad khan on Fri, 12/25/2020 - 07:30
Submitted by chengr rui on Wed, 03/10/2021 - 02:48

dsfdvd

Submitted by qi bin on Wed, 10/27/2021 - 07:15

How to access the dataset no link and what about the attributes no details

Submitted by Arwa Badhib on Wed, 02/28/2024 - 10:14

I don't see link for donwloading this dataset , anyhelp please ?

Submitted by Miftah Bedru on Wed, 06/26/2024 - 03:42

Dataset Files

    Files have not been uploaded for this dataset

    Documentation