IoT Network Intrusion Dataset
We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.
* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.
* All attacks except Mirai Botnet category are the packets captured while simulating attacks using tools such as Nmap. The case of Mirai Botnet category, the attack packets were generated on a laptop and then manipulated to make it appear as if it originated from the IoT device.
* Three more packet files of Mirai Botnet -- Host Discovery and Telnet Bruteforce -- were added on September 20, 2019.
2. Summary of Our Dataset
For academic purposes, we are happy to release our dataset.
After you submit your application form, we'll send the dataset download link to the email address you provided.
Dataset Download Application Form : http://bitly.kr/V9dFg
or you can download our dataset from IEEE dataport page: https://ieee-dataport.org/open-access/iot-network-intrusion-dataset
Please cite our dataset's page when you use this dataset as follows.
Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT Network Intrusion Dataset.", http://ocslab.hksecurity.net/Datasets/iot-network-intrusion-dataset, 2019
Hyunjae Kang, Dong Hyun Ahn, Gyung Min Lee, Jeong Do Yoo, Kyung Ho Park, and Huy Kang Kim, "IoT network intrusion dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/q70p-q449. Accessed: Sep. 30, 2019.
Hyunjae Kang (email@example.com) or Huy Kang Kim (firstname.lastname@example.org)