Datasets
The ISOT Lab has collected through different projects various datasets some of which are available for public sharing. The datasets are divided by area:
Drone Datasets
ISOT Drone Datasets Intrusion Detection Dataset based on DJI Tello Drone The ISOT Drone Anomaly Detection Dataset includes both anomaly and benign data collected from the DJI Edu Tello drone. It comprises over 23 GB of PCAP files capturing communication traffic...
IOT Security Datasets
BrakTooth Attack Dataset The ISOT BrakTooth Attack dataset contains Bluetooth classic traffic from benign Bluetooth communications, as well as BrakTooth-based attacks. The data was collected using an experimental active sniffer developed within the ISOT laboratory,...
ISOT Mil-STD-1553 Dataset
Dataset Description Click here to download the ISOT Mil-STD-1553 Dataset ISOT Mil-STD-1553 Dataset The dataset is a combination of datasets collected in a simulated environment consisting of normal activities and a series of attacks against the MIL-STD-1553...
Fake News Detection Datasets
The ISOT Fake News dataset is a compilation of several thousands fake news and truthful articles, obtained from different legitimate news sites and sites flagged as unreliable by Politifact.com. Dataset Description Click here to download the ISOT Fake News Dataset
Botnet and Ransomware Detection Datasets
ISOT Botnet Dataset The ISOT Botnet dataset is the combination of several existing publicly available malicious and non-malicious datasets. Dataset Description Click here to download the (2010) ISOT Botnet dataset. ISOT Ransomware Detection Dataset The ISOT Ransomware...
Behavioral Biometric Datasets
ISOT Mouse Dynamics Dataset The ISOT mouse dynamics dataset consists of mouse dynamics data for 48 users collected over several months. The dataset cannot be downloaded directly. Instead you need first to fill an agreement about how the data will be used; the...
Cloud Security Datasets
The ISOT Cloud IDS (ISOT CID) dataset consists of over 8Tb data collected in a real cloud environment and includes network traffic at VM and hypervisor levels, system logs, performance data (e.g. CPU utilization), and system calls. The dataset cannot be downloaded...
Journal & magazine links
- American Scientist Online
- Computer Communication Review
- Elsevier Computer Science
- Annual Computer Security Applications Conference
- IEEE Computer Society
- IEEE Security & Privacy Magazine
- IEICE Trans Search System
- International Journal of Digital Evidence
- ScienceDirect – Computers & Security
- ACM TISSEC (Transactions on Information & System Security)