Index of /publicDatasets/IoT-23-Dataset-v2/CTU-IoT-Malware-Capture-7-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2018-07-20-17-31-20-192.168.100.108-labels.config2024-01-21 16:57 2.6K 
[   ]2018-07-20-17-31-20-192.168.100.108-zeek-conn-log.labeled2024-01-21 17:21 1.5G 
[TXT]README.html2022-11-18 13:40 3.1K 
[TXT]README.md2022-11-18 12:14 2.6K 
[DIR]pcap/2022-11-25 16:15 -  
[DIR]zeek-labeled/2024-01-21 15:57 -  

IoT-23v2 CTU-IoT-Malware-Capture-7-1

Device and type of traffic

Network capture information

Description of files

Labels

Security experts labeled this dataset manually by analyzing the traffic and creating labeling rules. The labeling program used is NetflowLabeler https://github.com/stratosphereips/netflowlabeler. The labels.config file contains the rules used to label this capture.

Additional Files

For additional files associated with this capture, visit our Malware Dataset Website: https://mcfp.felk.cvut.cz/publicDatasets/IoT-23v2

About the IoT-23v2 dataset

This capture is part of the IoT-23v2 dataset, a dataset of network traffic from Internet of Things (IoT) devices. It has twenty malware captures executed in IoT devices and eight benign captures from IoT devices. The first version of this dataset, IoT-23, was first published in January 2020. Its goal is to offer an extensive and curated dataset of real and labeled IoT traffic for researchers to develop machine learning algorithms. The malware was allowed to connect to the Internet. The network traffic capture was done at the Stratosphere Laboratory, AIC group, CTU University in Prague, Czech Republic. Version 2 has the same traffic as version 1, but it is an improved version with much better labels, file organization, and a separation of the original three benign captures into eight. Avast Software funded this dataset and its research.

Contact

Contact our team for information about this dataset at mailto:stratosphere@aic.fel.cvut.cz.

Citation

For information on how to cite this dataset check our Stratosphere IoT-23 website.