Serial Number: 45
Year: 2017
Kind of Traffic: Real
Publicly Available:
Count of Records:
Features Count: 23
No. of citations: 911
Attack Type: N/A
Download Links: https://github.com/andypitcher/IoT_Sentinel/tree/master/captures_IoT_Sentinel
Abstract: To maintain the network security Miettinen and colleagues created a system of security called IoT SENTINEL, with the aim of recognizing devices within a network and then analysing the traffic originating from susceptible devices. To evaluate the effectiveness of their system, the researchers set up a testing environment that included diverse IoT devices. They network traffic was recorded to create a dataset which they used in the development of their device classification models. The researchers made this dataset publicly available in the format of unprocessed packet captures. The experimental setup included 31 consumer IoT devices representing various categories such as lighting, health, cameras, appliances, and home automation. Traffic recording took place while setting up the devices initially, and this setup process was replicated Twenty times. It is crucial to emphasize that the dataset does not have any signs of attacks. The recorded traffic predomi" "tly comprises IP traffic, originating straight from the devices in most instances or through a gateway for devices utilizing Z-wave or ZigBee communication protocols.