Dataset Details: IOTID20

Dataset Information

Serial Number: 81

Year: 2020

Kind of Traffic: Real

Publicly Available: Yes

Count of Records: 625783 instances

Features Count: 83

CITE

No. of citations: 311

Attack Type: DOS, Mirai, MITM, Scan

Download Links: https://www.kaggle.com/datasets/rohulaminlabid/iotid20-dataset

Abstract: Ullah and Mahmoud presented dataset IOTID20. The IoTID20 dataset is derived from a test environment that integrates IoT devices and interconnected systems, mimicking the setup of a standard smart home. The dataset is created using Wi-Fi cameras from EZVIZ and SKT NGU, which act as IoT devices vulnerable to attacks, and are linked to a Wi-Fi router of smart home. Router is connected to other devices like tablets, smartphones, and laptops and they act as attacking device. Attacks including Mirai (http flooding, Brute force, udp flooding), DoS (syn flooding), Scan (OS, host port) and MITM (ARP spoofing) are simulated. Features are extracted from pcap files using CICflowmeter application, this leads to the formation of a CSV dataset containing 80 network characteristics and three labeling attributes (binary, category, sub-category). The dataset mirrors modern IoT network communication trends and It stands out as one of the scarce publicly accessible datasets for IoT intrusion detection.

Back to Datasets