ts
float64
uid
string
id.orig_h
string
id.orig_p
int64
id.resp_h
string
id.resp_p
int64
proto
string
service
string
duration
float64
orig_bytes
int64
resp_bytes
int64
conn_state
string
local_orig
float64
local_resp
float64
missed_bytes
int64
history
string
orig_pkts
int64
orig_ip_bytes
int64
resp_pkts
int64
resp_ip_bytes
int64
label
string
null
null
null
17,576
null
8,081
tcp
null
0.000003
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000006
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000222
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000208
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000006
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000001
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000005
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000003
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000005
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000005
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000001
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000192
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000168
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000182
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000001
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000189
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000191
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000178
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.0002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000003
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000177
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000186
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.000002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000006
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
41,722
null
666
tcp
null
3.124232
0
0
S0
null
null
0
S
6
360
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000005
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.000001
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000001
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000003
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.000005
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000223
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000224
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000227
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.392533
0
0
REJ
null
null
0
Sr
2
80
2
80
Benign
null
null
null
17,832
null
37,215
tcp
null
0.861521
0
0
REJ
null
null
0
Sr
2
80
2
80
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000013
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.00019
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000187
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000006
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000199
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000198
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000175
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000215
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000203
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000214
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000181
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.00022
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.000211
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000215
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.00023
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
8,080
tcp
null
0.000006
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000016
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000207
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000191
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000185
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000199
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000175
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000178
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000176
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.0002
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000192
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.00017
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000014
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000197
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000206
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000196
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000192
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000186
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000177
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000188
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000196
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000217
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000215
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000207
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000232
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000214
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000173
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000176
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000178
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000206
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000208
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,088
null
80
tcp
null
0.000231
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.00023
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000214
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000201
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000205
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000199
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000206
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000171
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000194
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000202
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,576
null
8,081
tcp
null
0.000174
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000176
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
18,344
null
52,869
tcp
null
0.000194
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000227
0
0
S0
null
null
0
S
2
80
0
0
Malicious
null
null
null
17,832
null
37,215
tcp
null
0.000212
0
0
S0
null
null
0
S
2
80
0
0
Malicious

Aposemat IoT-23 - a Labeled Dataset with Malcious and Benign Iot Network Traffic

Homepage: https://www.stratosphereips.org/datasets-iot23

This dataset contains a subset of the data from 20 captures of Malcious network traffic and 3 captures from live Benign Traffic on Internet of Things (IoT) devices. Created by Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga at the Avast AIC laboratory with the funding of Avast Software, this dataset is one of the best in the field for Intrusion Detection Systems (IDS) for IoT Devices (Comparative Analysis of IoT Botnet Datasets).

The selection of the subset was determined by Aqeel Ahmed on Kaggle and contains 6 million samples. The Kaggle upload, nor this one, have employed data balancing. The Kaggle card does not contain methodology to understand what criteria was used to select these samples. If you want ensure best practice, use this dataset to mock-up processing the data into a model before using the full dataset with data balancing. This will require processing the 8GB of conn.log.labelled files.

Feature information:

All features originate from the Zeek processing performed by the dataset creators. See notes here for caviats for each column.

Expand for feature names, descriptions, and datatypes

Name: ts
Desription: This is the time of the first packet.
Data Type: float64 - Timestamp

Name: uid
Description: A Zeek-defined unique identifier of the connection.
Data type: string

Name: id.orig_h
Description: The originator’s IP address.
Data type: string - for the form 255.255.255.255 for IPv4 or [aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222] for IPv6

Name: id.orig_p
Description: The originator’s port number.
Data type: int64 - uint64 in original

Name: id.resp_h
Description: The responder’s IP address.
Data type: string - for the form 255.255.255.255 for IPv4 or [aaaa:bbbb:cccc:dddd:eeee:ffff:1111:2222] for IPv6

Name: id.resp_p
Description: The responder’s port number.
Data type: int64 - uint64 in original

Name: proto
Description: The transport layer protocol of the connection.
Data type: string - enum(unknown_transport, tcp, udp, icmp). Only TCP and UDP in subset

Name: service
Description: An identification of an application protocol being sent over the connection.
Data type: optional string

Name: duration
Description: How long the connection lasted.
Data type: optional float64 - time interval

Name: orig_bytes
Description: The number of payload bytes the originator sent.
Data type: optional int64 - uint64 in original

Name: resp_bytes
Description:The number of payload bytes the responder sent.
Data type: optional int64 - uint64 in original

Name: conn_state
Description: Value indicating connection state. (S0, S1, SF, REJ, S2, S3, RSTO, RSTR, RSTOS0, RSTRH, SH, SHR, OTH)
Data type: optional string

Name: local_orig
Description: If the connection is originated locally, this value will be T. If it was originated remotely it will be F. Data type: optional float64 - bool in original but null for all columns

Name: local_resp Description: If the connection is responded to locally, this value will be T. If it was responded to remotely it will be F. Data type: optional float64 - bool in original but null for all columns

Name: missed_bytes
Description: Indicates the number of bytes missed in content gaps, which is representative of packet loss.
Data type: optional int64 - uint64 in original. default = 0

Name: history
Description: Records the state history of connections as a string of letters.
Data type: optional string

Name: orig_pkts
Description: Number of packets that the originator sent.
Data type: optional int64 - uint64 in original

Name: orig_ip_bytes
Description: Number of IP level bytes that the originator sent.
Data type: optional int64 - uint64 in original

Name: resp_pkts
Description: Number of packets that the responder sent.
Data type: optional int64 - uint64 in original

Name: resp_ip_bytes
Description: Number of IP level bytes that the responder sent.
Data type: optional int64 - uint64 in original

Name: label
Description: Specifies if data point is benign or some form of malicious. See the dataset creators paper for descriptions of attack types
Data type: string - enum('PartOfAHorizontalPortScan', 'Okiru', 'DDoS', 'C&C-HeartBeat', 'Benign', 'C&C-Torii', 'C&C', 'C&C-FileDownload', 'Okiru-Attack', 'Attack', 'FileDownload', 'C&C-HeartBeat-FileDownload', 'C&C-Mirai')

NOTE: ts, uid, id.orig_h, id.resp_h SHOULD BE removed as they are dataset specific. Models should not be trained with specific timestamps or IP addresses (id.orig_h), as that can lead to over fitting to dataset specific times and addresses.
Further local_orig, local_resp SHOULD BE removed as they are null in all rows, so they are useless for training.

Citation

If you are using this dataset for your research, please reference it as “Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. http://doi.org/10.5281/zenodo.4743746” More Information needed

Downloads last month
0
Edit dataset card