Serial Number: 119
Year: 2025
Kind of Traffic: Simulated
Publicly Available: Yes
Count of Records: 34.5GB
Features Count: 23
No. of citations: 0
Attack Type: DoS, Remote Command Execution, Ingress Tool Transfer, Reporting, Telnet Brute Forcing, Network Scanning, Periodic C&C Communication, Remote Code Execution, CoAP Amplification Attack
Download Links: https://zenodo.org/records/14502760
Abstract: The Gotham Dataset is a large-scale IoT network traffic dataset generated using the Gotham testbed, an emulated IoT environment designed for realistic and heterogeneous network security research. It includes traffic from 78 IoT devices operating on multiple protocols such as MQTT, CoAP, and RTSP. Network traffic was captured in PCAP format using tcpdump, covering both benign and malicious activities. The malicious traffic was generated through scripted attacks, including DoS, Telnet Brute Force, Network Scanning, CoAP Amplification, and Command & Control (C&C) communication. Processed in Python using Tshark, the dataset is available in both raw PCAP and labeled CSV formats. Collected in a distributed manner at the interface between IoT gateways and devices, the dataset provides a valuable resource for developing Intrusion Detection Systems and security solutions for complex IoT environments. It is publicly available on Zenodo.