The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data.

Abstract— This research focuses on the requirements for and the creation of an intrusion detection system (IDS) dataset for an Internet of Things (IoT) network domain.

Categories:
266 Views

The Internet of Things (IoT) is reshaping our connected world, due to the prevalence of lightweight devices connected to the Internet and their communication technologies. Therefore, research towards intrusion detection in the IoT domain has a lot of significance. Network intrusion datasets are fundamental for this research, as many attack detection strategies have to be trained and evaluated using these datasets.

Categories:
593 Views

This survey covers more than 150 published papers related to sub-6 GHz wideband LNAs from IEEE publications such as ISSCC, JSSC, TMTT, RFIC, MWCL, TCAS and NEWCAS published in the last 20 years. The considered LNAs are classified according to the technology node and its topology. The presented database is a useful tool for investigating technology trends and comparing the performance of common LNA design styles. 

Instructions: 

- The database is organized by technology and topology. 

Categories:
147 Views

Here we introduce so-far the largest subject-rated database of its kind, namely, "Effect of Sugarcane vegetation on path-loss between CC2650 and CC2538 SoC 32-bit Arm Cortex-M3 based sensor nodes operating at 2.4 GHz Radio Frequency (RF)".

Categories:
243 Views

Here we introduce so-far the largest subject-rated database of its kind, namely, "Effect of Paddy Rice vegetation on path-loss between CC2650 SoC 32-bit Arm Cortex-M3 based sensor nodes operating at 2.4 GHz Radio Frequency (RF)". This database contains received signal strength measurements collected through campaigns in the IEEE 802.15.4 standard precision agricultural monitoring infrastructure developed for Paddy rice crop monitoring from period 03/07/2019 to 18/11/2019.

Categories:
258 Views

Here we introduce so-far the largest subject-rated database of its kind, namely, "Effect of Paddy Rice vegetation on received signal strength between CC2538 SoC 32-bit Arm Cortex-M3 based sensor nodes operating at 2.4 GHz Radio Frequency (RF)". This database contains received signal strength measurements collected through campaigns in the IEEE 802.15.4 standard precision agricultural monitoring infrastructure developed for Paddy Rice crop monitoring from period 01/07/2020 to 03/11/2020.

Categories:
137 Views

Here we introduce so-far the largest subject-rated database of its kind, namely, "Effect of Millet vegetation on path-loss between CC2538 SoC 32-bit Arm Cortex-M3 based sensor nodes operating at 2.4 GHz Radio Frequency (RF)". This database contains received signal strength measurements collected through campaigns in the IEEE 802.15.4 standard precision agricultural monitoring infrastructure developed for millet crop monitoring from period 03/06/2020 to 04/10/2020.

Categories:
127 Views

This dataset is captured from a Mirai type botnet attack on an emulated IoT network in OpenStack. Detailed information on the dataset is depicted in the following work. Please cite it when you use this dataset for your research.

  • Kalupahana Liyanage Kushan Sudheera, Dinil Mon Divakaran, Rhishi Pratap Singh, and Mohan Gurusamy, "ADEPT: Detection and Identification of Correlated Attack-Stages in IoT Networks," in IEEE Internet of Things Journal.

Categories:
808 Views

This dataset contains the database of the transport block (TB) configurations .

Categories:
112 Views

Message Queuing Telemetry Transport (MQTT) protocol is one of the most used standards used in Internet of Things (IoT) machine to machine communication. The increase in the number of available IoT devices and used protocols reinforce the need for new and robust Intrusion Detection Systems (IDS). However, building IoT IDS requires the availability of datasets to process, train and evaluate these models. The dataset presented in this paper is the first to simulate an MQTT-based network. The dataset is generated using a simulated MQTT network architecture.

Instructions: 

The dataset consists of 5 pcap files, namely, normal.pcap, sparta.pcap, scan_A.pcap, mqtt_bruteforce.pcap and scan_sU.pcap. Each file represents a recording of one scenario; normal operation, Sparta SSH brute-force, aggressive scan, MQTT brute-force and UDP scan respectively. The attack pcap files contain background normal operations. The attacker IP address is “192.168.2.5”. Basic packet features are extracted from the pcap files into CSV files with the same pcap file names. The features include flags, length, MQTT message parameters, etc. Later, unidirectional and bidirectional features are extracted.  It is important to note that for the bidirectional flows, some features (pointed as *) have two values—one for forward flow and one for the backward flow. The two features are recorded and distinguished by a prefix “fwd_” for forward and “bwd_” for backward. 

 

Categories:
5782 Views

Pages