IoT Vulnerability Dataset

Published: 31 May 2024| Version 1 | DOI: 10.17632/7m58kxs742.1
Contributors:
Manasa Koppula,

Description

The dataset uploaded here is generated in a realistic manner with IoT devices connected to the internet through router. By using well known ethical hacking tool Kali Linux is used for hacking the devices to generate network traffic of various attack network traffic. Wireshark software was used for capturing the data. All the PCAP files generated and their corresponding csv files have been uploaded here for the researchers in the field of IoT security.

Files

Institutions

SR Engineering College

Categories

Cybersecurity, Internet of Things

Funding

SR University funded stipend for my Research

Licence