Serial Number: 81
Year: 2020
Kind of Traffic: Real
Publicly Available: Yes
Count of Records: 625783 instances
Features Count: 83
No. of citations: 311
Attack Type: DOS, Mirai, MITM, Scan
Download Links: https://www.kaggle.com/datasets/rohulaminlabid/iotid20-dataset
Abstract: Ullah and Mahmoud presented dataset IOTID20. The IoTID20 dataset is derived from a test environment that integrates IoT devices and interconnected systems, mimicking the setup of a standard smart home. The dataset is created using Wi-Fi cameras from EZVIZ and SKT NGU, which act as IoT devices vulnerable to attacks, and are linked to a Wi-Fi router of smart home. Router is connected to other devices like tablets, smartphones, and laptops and they act as attacking device. Attacks including Mirai (http flooding, Brute force, udp flooding), DoS (syn flooding), Scan (OS, host port) and MITM (ARP spoofing) are simulated. Features are extracted from pcap files using CICflowmeter application, this leads to the formation of a CSV dataset containing 80 network characteristics and three labeling attributes (binary, category, sub-category). The dataset mirrors modern IoT network communication trends and It stands out as one of the scarce publicly accessible datasets for IoT intrusion detection.