Datasets
Open Access
Data generation and knowledge sharing for robust intrusion detection in IoT systems
- Citation Author(s):
- Submitted by:
- Christian Rohner
- Last updated:
- Fri, 11/01/2024 - 13:10
- DOI:
- 10.21227/3y2p-4d62
- Data Format:
- Link to Paper:
- License:
18 Views
- Categories:
- Keywords:
0 ratings - Please login to submit your rating.
Abstract
The data set includes attack implementations in an Internet of Things (IoT) context. The IoT nodes use Contiki-NG as their operating system and the data is collected from the Cooja simulation environment where a large number of network topologies are created. Blackhole and DIS-flooding attacks are implemented to attack the RPL routing protocol.
The datasets includes log file output from the Cooja simulator and a pre-processed feature set as input to an intrusion detection model.
Instructions:
(tbd, data will be uploaded before November 1, 2024)
Code for pre-processing, modelling and knowledge sharing: https://github.com/uu-core/iot-ids-models
Funding Agency:
Vinnova (Sweden's innovation agency)
Grant Number:
2021-02423; 2023-02982
Dataset Files
- data-traces1-NOMS-2023.zip (12.81 GB)
- README.txt (1.02 kB)
Open Access dataset files are accessible to all logged in users. Don't have a login? Create a free IEEE account. IEEE Membership is not required.