![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | 2018-05-09-17-30-31-192.168.100.103-labels.config | 2023-01-09 18:26 | 2.2K | |
![]() | 2018-05-09-17-30-31-192.168.100.103-zeek-conn-log.labeled | 2023-12-12 01:02 | 138M | |
![]() | README.html | 2022-11-18 13:39 | 3.1K | |
![]() | README.md | 2022-11-18 12:14 | 2.6K | |
![]() | pcap/ | 2022-11-25 12:14 | - | |
![]() | zeek-labeled/ | 2024-01-21 14:37 | - | |
Security experts labeled this dataset manually by analyzing the traffic and creating labeling rules. The labeling program used is NetflowLabeler https://github.com/stratosphereips/netflowlabeler. The labels.config
file contains the rules used to label this capture.
For additional files associated with this capture, visit our Malware Dataset Website: https://mcfp.felk.cvut.cz/publicDatasets/IoT-23v2
This capture is part of the IoT-23v2 dataset, a dataset of network traffic from Internet of Things (IoT) devices. It has twenty malware captures executed in IoT devices and eight benign captures from IoT devices. The first version of this dataset, IoT-23, was first published in January 2020. Its goal is to offer an extensive and curated dataset of real and labeled IoT traffic for researchers to develop machine learning algorithms. The malware was allowed to connect to the Internet. The network traffic capture was done at the Stratosphere Laboratory, AIC group, CTU University in Prague, Czech Republic. Version 2 has the same traffic as version 1, but it is an improved version with much better labels, file organization, and a separation of the original three benign captures into eight. Avast Software funded this dataset and its research.
Contact our team for information about this dataset at mailto:stratosphere@aic.fel.cvut.cz.
For information on how to cite this dataset check our Stratosphere IoT-23 website.