Serial Number: 76
Year: 2020
Kind of Traffic: Real
Publicly Available: Yes
Count of Records: 3.8M
Features Count: 112
No. of citations: 34
Attack Type: IP based attacks
Download Links: https://github.com/gspathoulas/ghost-iot-dataset?tab=readme-ov-file
Abstract: Within the project GHOST EU, Anagnostopoulos and colleagues created the GHOST-IoT-data-set, which is openly accessible and was developed as part of the project's framework. This dataset includes network traffic derived from an actual Smart Home setup implemented in a dwelling occupied by two individuals. The Smart Home environment includes nine devices: two door sensors, four motion sensors, an emergency button, a blood pressure meter, and a weight scale. These devices employ various communication protocols of network , including IP, Z-Wave, ZigBee, RF869 and Bluetooth. The emergency button employs the RF869 protocol, which is a proprietary protocol designed to function within the ISM (Industrial, Scientific, and Medical) bandwidth, specifically around 869 MHz. To enable communication between ZigBee, Bluetooth devices and the Internet, a gateway is included in the configuration. This gateway uses the PPP to establish a direct connection to a router, enabling Internet access. The network traffic of these devices was recorded in October 2019 over a period of ten days. The normal behaviour of the devices were captured in initial 9 days, On the tenth day, seven attack scenarios were executed. These scenarios included connecting unknown devices, and modifying the devices' locations, simulating physical battery drain or firmware modification by removing the devices' batteries, and inundating the network with an abundance of consecutive measurements. The entire dataset includes 3,811,419 number of raw packets. Supplementary files are incorporated into the dataset, consolidating traffic into flows and furnishing statistical features which are descriptive. It's important to note that the attacks within the dataset are not explicitly labeled.