Datasets
Open Access
IoT network intrusion dataset
- Citation Author(s):
- Submitted by:
- Huy Kang Kim
- Last updated:
- Fri, 09/27/2019 - 04:57
- DOI:
- 10.21227/q70p-q449
- Data Format:
- Links:
- License:
- Categories:
- Keywords:
Abstract
We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.
* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.
* All attacks except Mirai Botnet category are the packets captured while simulating attacks using tools such as Nmap. The case of Mirai Botnet category, the attack packets were generated on a laptop and then manipulated to make it appear as if it originated from the IoT device.
The dataset consists of 42 raw network packet files (pcap) at different time points.
* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.
* All attacks except Mirai Botnet category are the packets captured while simulating attacks using tools such as Nmap. The case of the Mirai Botnet category, the attack packets were generated on a laptop and then manipulated to make it appear as if it originated from the IoT device.
<packet file description>
benign-dec.pcap: benign-only traffic
mitm-arpspoofing-n(1~6)-dec.pcap: traffic containing benign and MITM(arp spoofing)
dos-synflooding-n(1~6)-dec.pcap: traffic containing benign and DoS(SYN flooding) attack
scan-hostport-n(1~6)-dec.pcap: traffic containing benign and Scan(host & port scan) attack
scan-portos-n(1~6)-dec.pcap: traffic containing benign and Scan(port & os scan) attack
mirai-udpflooding-n(1~4)-dec.pcap: traffic containing benign and 3 most typical attacks(UDP/ACK/HTTP Flooding) of zombie pc compromised by mirai malware
mirai-ackflooding-n(1~4)-dec.pcap
mirai-httpflooding-n(1~4)-dec.pcap
mirai-hostbruteforce-n(1~5)-dec.pcap: traffic containing benign and initial phase of Mirai malware including host discovery and Telnet brute-force attack
Dataset Files
- iot_intrusion_dataset.zip (823.69 MB)
- dataset_description.xlsx (24.63 kB)
Open Access dataset files are accessible to all logged in users. Don't have a login? Create a free IEEE account. IEEE Membership is not required.
Comments
Quick MAC address and IP address summary for your convenience.
Here are the MAC addresses and IP addresses of the two IoT devices.
1. EZVIZ (Home camera)
- MAC address: bc:1c:81:4b:ae:ba
- IP address: 192.168.0.13
2. NUGU (AI speaker)
- MAC address: 04:32:f4:45:17:b3
- IP address: 192.168.0.24
Very Warm Regards,
This side Ankita a research scholar wants permission to access this dataset for my research to continue. Please reply as soon as possible.
You can download IoT dataset on the right side of this page.
see "DATASET FILES".
Thank you so much
Hello
Myself Neetu A Research Scholar want to access your dataset for research Purpose. Please Allow me to do so.
Thanks & Regards
Neetu
You can download IoT dataset on the right side of this page. See the "DATASET FILES".
I know its has been a long time but still Thank you so Much Sir.
Hello,
I want to use your dataset for the university research project. Is it okay to use it?
Absolutely, yes. Thank you for showing your interest in our dataset.
Very Warm Regards,
This side Ahmad Houkan a research scholar wants permission to access this dataset for my research to continue. Please reply as soon as possible.
Hi, I am sorry for the late reply.
You can download IoT dataset on the right side of this page "DATASET FILES" without any permission, as this is an open access dataset.
Also you can freely use this dataset for your research. Please cite this dataset when you use it.
Hi, I would like to split the given PCAP files in the dataset into packet based and flow based. If anybody have any solution for this, please do reply this comment.
I know several months have passed since you queried, though you can parse the packets by writing Python codes using packet handling libraries such as scapy or dpkt. Parse IP addresses, ports, or streams you need using the libraries and save them into another PCAP.
I'm looking to conduct a research project for my MSc into the effectiveness of current protocols in securing AI-enabled IoT devices in smart homes from network intrusion. Would your dataset suit this purpose and would you be able to indicate where I could begin with a simulation? Many thanks