19kmunz commited on
Commit
4f1a6ee
1 Parent(s): 7036fb2

Update README.md

Browse files

Adds basic description, feature information, and citation

Files changed (1) hide show
  1. README.md +88 -1
README.md CHANGED
@@ -42,7 +42,94 @@ configs:
42
  data_files:
43
  - split: train
44
  path: data/train-*
 
 
 
 
 
 
 
 
45
  ---
46
- # Dataset Card for "iot-23-preprocessed"
 
47
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
48
  [More Information needed](https://github.com/huggingface/datasets/blob/main/CONTRIBUTING.md#how-to-contribute-to-the-dataset-cards)
 
42
  data_files:
43
  - split: train
44
  path: data/train-*
45
+ task_categories:
46
+ - text-classification
47
+ - question-answering
48
+ language:
49
+ - en
50
+ tags:
51
+ - code
52
+ pretty_name: d
53
  ---
54
+ # Aposemat IoT-23 - a Labeled Dataset with Malcious and Benign Iot Network Traffic
55
+ **Homepage:** [https://www.stratosphereips.org/datasets-iot23](https://www.stratosphereips.org/datasets-iot23)
56
 
57
+ This dataset contains a subset of the data from 20 captures of Malcious network traffic and 3 captures from live Benign Traffic on Internet of Things (IoT) devices. Created by Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga at the Avast AIC laboratory with the funding of Avast Software, this dataset is one of the best in the field for Intrusion Detection Systems (IDS) for IoT Devices [(Comparative Analysis of IoT Botnet Datasets)](https://doi.org/10.53070/bbd.1173687).
58
+
59
+ The selection of the subset was determined by [Aqeel Ahmed on Kaggle](https://www.kaggle.com/datasets/engraqeel/iot23preprocesseddata) and contained 6 million samples. The Kaggle upload, nor this one, have employed data balancing. The Kaggle card does not contain methodology to understand what criteria was used to select these samples. If you want ensure best practice, use this dataset to mock-up processing the data into a model before using the full dataset with data balancing. This will require processing the 8GB of conn.log.labelled files.
60
+
61
+ This dataset only notes if the data is Malcious or Benign. The original dataset labels the type of malcious traffic aswell. This means this processing of the dataset is only suited for binary classification.
62
+
63
+ # Feature information:
64
+
65
+ All features originate from the [Zeek](https://docs.zeek.org/en/master/scripts/base/protocols/conn/main.zeek.html#type-Conn::Info) processing performed by the dataset creators. [See notes here for caviats for each column](https://docs.zeek.org/en/master/scripts/base/protocols/conn/main.zeek.html#type-Conn::Info).
66
+ <details>
67
+ <summary>Expand for feature names, descriptions, and datatypes</summary>
68
+
69
+ Name: id.orig_p
70
+ Description: The originator’s port number.
71
+ Data type: int64 - uint64 in original
72
+
73
+ Name: id.resp_p
74
+ Description: The responder’s port number.
75
+ Data type: int64 - uint64 in original
76
+
77
+ Name: proto
78
+ Description: The transport layer protocol of the connection.
79
+ Data type: string - enum(unknown_transport, tcp, udp, icmp). Only TCP and UDP in subset
80
+
81
+ Name: service
82
+ Description: An identification of an application protocol being sent over the connection.
83
+ Data type: string
84
+
85
+ Name: duration
86
+ Description: How long the connection lasted.
87
+ Data type: float64 - time interval
88
+
89
+ Name: orig_bytes
90
+ Description: The number of payload bytes the originator sent.
91
+ Data type: int64 - uint64 in original
92
+
93
+ Name: resp_bytes
94
+ Description:The number of payload bytes the responder sent.
95
+ Data type: int64 - uint64 in original
96
+
97
+ Name: conn_state
98
+ Description: Value indicating connection state. (S0, S1, SF, REJ, S2, S3, RSTO, RSTR, RSTOS0, RSTRH, SH, SHR, OTH)
99
+ Data type: string
100
+
101
+ Name: missed_bytes
102
+ Description: Indicates the number of bytes missed in content gaps, which is representative of packet loss.
103
+ Data type: int64 - uint64 in original
104
+
105
+ Name: history
106
+ Description: Records the state history of connections as a string of letters.
107
+ Data type: string
108
+
109
+ Name: orig_pkts
110
+ Description: Number of packets that the originator sent.
111
+ Data type: int64 - uint64 in original
112
+
113
+ Name: orig_ip_bytes
114
+ Description: Number of IP level bytes that the originator sent.
115
+ Data type: int64 - uint64 in original
116
+
117
+ Name: resp_pkts
118
+ Description: Number of packets that the responder sent.
119
+ Data type: int64 - uint64 in original
120
+
121
+ Name: resp_ip_bytes
122
+ Description: Number of IP level bytes that the responder sent.
123
+ Data type: int64 - uint64 in original
124
+
125
+ Name: label
126
+ Description: Specifies if data point is malicious or benign
127
+ Data type: string - enum(Malicious, Benign)
128
+
129
+ NOTE: ts, uid, id.orig_h, id.resp_h have been removed as they are dataset specific. Models should not be trained with specific timestamps or IP addresses (id.orig_h) using this dataset, as that can lead to over fitting to dataset specific times and addresses.
130
+ Further local_orig, local_resp have been removed as they are null in all rows, so they are useless for training.
131
+ </details>
132
+
133
+ ## Citation
134
+ If you are using this dataset for your research, please reference it as “Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. http://doi.org/10.5281/zenodo.4743746”
135
  [More Information needed](https://github.com/huggingface/datasets/blob/main/CONTRIBUTING.md#how-to-contribute-to-the-dataset-cards)