Bot-IoT dataset Read Me
Bot-IoT dataset Read Me
The raw network pacekts (Pcap files) of the BoT-IoT dataset were created by application of the tshark
tool, in the Cyber Range Lab of the Australina Center for Cyber Security (ACCS), and incorporates a
combination of normal and abnormal traffic. Simulated network traffic was generated through Ostinato
tool and Node-red (for non-IoT and IoT respectively).The dataset’s source files are provided in different
formats, such as the original pcap files, the generated argus files and finally in csv format. The files were
separated, based on attack category and subcategory, to better assist in labeling process.
Dataset:
o 5%
o 10-best features
10-best Training-Testing split
o All features o Entire Dataset o Features Explanation
Ground Truth
PCAPs:
o DDoS o DDoS_HTTP o DDoS_TCP o DDoS_UDP
o DoS o DoS_HTTP o DoS_TCP o DoS_UDP
o Scan
o OS
1
2
3
4
o Service
o Theft
o Data_Exfiltration
o Keylogging
Free use of the Bot-IoT dataset for academic research purposes is hereby granted in perpetuity. Use for
commercial purposes is strictly prohibited. Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova have
asserted their rights under the Copyright.
Those who wish to make use of Bot-IoT dataset have to cite the following paper that elaborates on its
creation.
For more information about the dataset, please contact the authors: