IoT Network Intrusion Dataset

1. Dataset

We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.

* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.

* All attacks except Mirai Botnet category are the packets captured while simulating attacks using tools such as Nmap. The case of Mirai Botnet category, the attack packets were generated on a laptop and then manipulated to make it appear as if it originated from the IoT device.


Revision History

* Three more packet files of Mirai Botnet -- Host Discovery and Telnet Bruteforce -- were added on September 20, 2019.


2. Summary of Our Dataset

3. Downloads

For academic purposes, we are happy to release our dataset.

After you submit your application form, we'll send the dataset download link to the email address you provided.


4. Citation

Please cite our dataset's page when you use this dataset as follows.

Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT Network Intrusion Dataset.", http://ocslab.hksecurity.net/Datasets/iot-network-intrusion-dataset, 2019

or

Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT network intrusion dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/q70p-q449. Accessed: Sep. 30, 2019.


5. Contact

Hyunjae Kang (trifle19@korea.ac.kr) or Huy Kang Kim (cenda@korea.ac.kr)

dataset_description.xlsx