IoT Vulnerability Dataset
Published: 31 May 2024| Version 1 | DOI: 10.17632/7m58kxs742.1
Contributors:
Manasa Koppula, Description
The dataset uploaded here is generated in a realistic manner with IoT devices connected to the internet through router. By using well known ethical hacking tool Kali Linux is used for hacking the devices to generate network traffic of various attack network traffic. Wireshark software was used for capturing the data. All the PCAP files generated and their corresponding csv files have been uploaded here for the researchers in the field of IoT security.
Files
Institutions
SR Engineering College
Categories
Cybersecurity, Internet of Things
Funding
SR University funded stipend for my Research