IoT Network Intrusion Dataset
1. Dataset
We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.
* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.
* All attacks except Mirai Botnet category are the packets captured while simulating attacks using tools such as Nmap. The case of Mirai Botnet category, the attack packets were generated on a laptop and then manipulated to make it appear as if it originated from the IoT device.
Revision History
* Three more packet files of Mirai Botnet -- Host Discovery and Telnet Bruteforce -- were added on September 20, 2019.
2. Summary of Our Dataset
3. Downloads
You can download our dataset from IEEE dataport page: https://ieee-dataport.org/open-access/iot-network-intrusion-dataset
4. Citation
Please cite our dataset's page when you use this dataset as follows.
Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT Network Intrusion Dataset.", http://ocslab.hksecurity.net/Datasets/iot-network-intrusion-dataset, 2019
or
Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT network intrusion dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/q70p-q449. Accessed: Sep. 30, 2019.
5. Contact
Hyunjae Kang (trifle19@korea.ac.kr) or Huy Kang Kim (cenda@korea.ac.kr)
6. SEE ALSO
See also our another dataset containing IoT traffic: IoT-Environment-Dataset
Please read [IoT-Environment-Dataset > 1.3 Comparison with IoT Network Intrusion Dataset] for more details.