--- dataset_info: features: - name: features sequence: float32 length: 115 - name: attack dtype: class_label: names: '0': benign_traffic '1': combo '2': junk '3': mirai-ack '4': mirai-scan '5': mirai-syn '6': mirai-udp '7': mirai-udpplain '8': scan '9': tcp '10': udp - name: device dtype: class_label: names: '0': Danmini_Doorbell '1': Ecobee_Thermostat '2': Ennio_Doorbell '3': Philips_B120N10_Baby_Monitor '4': Provision_PT_737E_Security_Camera '5': Provision_PT_838_Security_Camera '6': Samsung_SNH_1011_N_Webcam '7': SimpleHome_XCS7_1002_WHT_Security_Camera '8': SimpleHome_XCS7_1003_WHT_Security_Camera splits: - name: train num_bytes: 2857231888 num_examples: 6002588 - name: test num_bytes: 504568568 num_examples: 1060018 download_size: 1772922927 dataset_size: 3361800456 license: cc-by-4.0 pretty_name: nbaiot --- # Dataset Card for N-BAIoT *From https://archive.ics.uci.edu/dataset/442/detection+of+iot+botnet+attacks+n+baiot:* This dataset addresses the lack of public botnet datasets, especially for the IoT. It suggests *real* traffic data, gathered from 9 commercial IoT devices authentically infected by Mirai and BASHLITE. ## Dataset Details ### Dataset Description *From https://archive.ics.uci.edu/dataset/442/detection+of+iot+botnet+attacks+n+baiot:* (a) Attribute being predicted: -- Originally we aimed at distinguishing between benign and Malicious traffic data by means of anomaly detection techniques. -- However, as the malicious data can be divided into 10 attacks carried by 2 botnets, the dataset can also be used for multi-class classification: 10 classes of attacks, plus 1 class of 'benign'. (b) The study's results: -- For each of the 9 IoT devices we trained and optimized a deep autoencoder on 2/3 of its benign data (i.e., the training set of each device). This was done to capture normal network traffic patterns. -- The test data of each device comprised of the remaining 1/3 of benign data plus all the malicious data. On each test set we applied the respective trained (deep) autoencoder as an anomaly detector. The detection of anomalies (i.e., the cyberattacks launched from each of the above IoT devices) concluded with 100% TPR. - **Curated by:** Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Breitenbacher, Dominik, , Asaf, and Shabtai, Asaf - **License:** [Creative Commons Attribution 4.0 International (CC BY 4.0)](https://creativecommons.org/licenses/by/4.0/legalcode) ### Dataset Sources - **Repository:** https://archive.ics.uci.edu/dataset/442/detection+of+iot+botnet+attacks+n+baiot - **Paper:** https://arxiv.org/abs/1805.03409 ## Citation **BibTeX:** @misc{misc_detection_of_iot_botnet_attacks_n_baiot_442, author = {Meidan,Yair, Bohadana,Michael, Mathov,Yael, Mirsky,Yisroel, Breitenbacher,Dominik, ,Asaf, and Shabtai,Asaf}, title = {{N-BaIoT Dataset to Detect IoT Botnet Attacks}}, year = {2018}, howpublished = {UCI Machine Learning Repository}, note = {{DOI}: https://doi.org/10.24432/C5RC8J} } **APA:** Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Breitenbacher, Dominik, ,Asaf, and Shabtai, Asaf. (2018). N-BaIoT Dataset to Detect IoT Botnet Attacks. UCI Machine Learning Repository. https://doi.org/10.24432/C5RC8J. ## Glossary [optional] - **IoT**: Internet of Things - **Botnet**: A collection of devices that are maliciously controlled via malware