This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1296
The BoT-IoT Dataset
External Dataset
External Data Source
www.unsw.adfa.edu.au
Unknown
Unknown
56 (lowest rank is 56)

Category & Restrictions

Other
simulated attacks, denial of service, network data, cyber attack, iot, packet captures
Unrestricted
Unknown

Description


The BoT-IoT dataset was created by designing a realistic network environment in the Cyber Range Lab of The center of UNSW Canberra Cyber. The environment incorporates a combination of normal and botnet traffic. The dataset's source files are provided in different formats, including the original pcap files, the generated argus files and csv files.

The dataset has captured pcap files that are 69.3 GB in size, with more than 72.000.000 records. The extracted flow traffic, in csv format is 16.7 GB in size. The dataset includes DDoS, DoS, OS and Service Scan, Keylogging and Data exfiltration attacks, with the DDoS and DoS attacks further organized, based on the protocol used.

Additional Details

1,020.4MB
false
Unknown
dataset, iot, bot, the bot-iot dataset, 1296, source, inferlink, inferlink corporation, corporation, external data source, external, files, cyber, environment, traffic, csv, pcap, formats, datasets, range, network, original, center, designing, argus, botnet, normal, incorporates, created, including, realistic, combination, generated, lab, canberra, unsw, gb, dos, size, attacks, ddos, 000, service, extracted, organized, protocol, flow, other, records, scan, includes, format, keylogging, captured, based, os, exfiltration