4 datasets found
  1. f

    IoT Network Intrusion Dataset

    • figshare.com
    csv
    Updated May 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Qusay H. Mahmoud; Imtiaz Ullah (2025). IoT Network Intrusion Dataset [Dataset]. http://doi.org/10.6084/m9.figshare.29143829.v2
    Explore at:
    csvAvailable download formats
    Dataset updated
    May 24, 2025
    Dataset provided by
    figshare
    Authors
    Qusay H. Mahmoud; Imtiaz Ullah
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The exponential growth of the Internet of Things (IoT) devices provides a large attack surface for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the target IoT network resources with malicious activity. New techniques and detection algorithms required a well-designed dataset for IoT networks. We proposed a new dataset, namely IoTID20, generated dataset from [1]. The new IoT botnet dataset has a more comprehensive network and flow-based features. The flow-based feature can be used to analyze and evaluate a flow-based intrusion detection system. Our proposed IoT botnet dataset will provide a reference point to identify anomalous activity across the IoT networks. The IoT Botnet dataset can be accessed from [2]. The new IoTID20 dataset will provide a foundation for the development of new intrusion detection techniques in IoT networks.

  2. h

    IoTID20

    • huggingface.co
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Maruf Islam, IoTID20 [Dataset]. https://huggingface.co/datasets/maruuf/IoTID20
    Explore at:
    Authors
    Maruf Islam
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    maruuf/IoTID20 dataset hosted on Hugging Face and contributed by the HF Datasets community

  3. i

    IoT network intrusion dataset

    • ieee-dataport.org
    Updated Sep 27, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Huy Kang Kim (2019). IoT network intrusion dataset [Dataset]. https://ieee-dataport.org/open-access/iot-network-intrusion-dataset
    Explore at:
    Dataset updated
    Sep 27, 2019
    Authors
    Huy Kang Kim
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    including some laptops or smart phones

  4. h

    IoT-ID20-DiFL

    • huggingface.co
    Updated Jun 17, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Việt Huy Dương (2025). IoT-ID20-DiFL [Dataset]. https://huggingface.co/datasets/Ben11304/IoT-ID20-DiFL
    Explore at:
    Dataset updated
    Jun 17, 2025
    Authors
    Việt Huy Dương
    Description

    Ben11304/IoT-ID20-DiFL dataset hosted on Hugging Face and contributed by the HF Datasets community

  5. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Qusay H. Mahmoud; Imtiaz Ullah (2025). IoT Network Intrusion Dataset [Dataset]. http://doi.org/10.6084/m9.figshare.29143829.v2

IoT Network Intrusion Dataset

Explore at:
csvAvailable download formats
Dataset updated
May 24, 2025
Dataset provided by
figshare
Authors
Qusay H. Mahmoud; Imtiaz Ullah
License

Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically

Description

The exponential growth of the Internet of Things (IoT) devices provides a large attack surface for intruders to launch more destructive cyber-attacks. The intruder aimed to exhaust the target IoT network resources with malicious activity. New techniques and detection algorithms required a well-designed dataset for IoT networks. We proposed a new dataset, namely IoTID20, generated dataset from [1]. The new IoT botnet dataset has a more comprehensive network and flow-based features. The flow-based feature can be used to analyze and evaluate a flow-based intrusion detection system. Our proposed IoT botnet dataset will provide a reference point to identify anomalous activity across the IoT networks. The IoT Botnet dataset can be accessed from [2]. The new IoTID20 dataset will provide a foundation for the development of new intrusion detection techniques in IoT networks.

Search
Clear search
Close search
Google apps
Main menu