Skip to main content
. 2023 Jul 11;23(14):6302. doi: 10.3390/s23146302

Table 3.

Scenarios in IoT-23 dataset.

Scenarios Type Capture Name Malware/Device Duration Number of Packets Total Flows
Scenario 1 Malicious CTU-IoT-Malware-Cap-34-1 Mirai 24,000 233,000 23,146,000
Scenario 2 Malicious CTU-IoT-Malware-Cap-43-1 Mirai 1000 82,000,000 67,321,810,000
Scenario 3 Malicious CTU-IoT-Malware-Cap-44-1 Mirai 2000 1,309,000 238,000
Scenario 4 Malicious CTU-IoT-Malware-Cap-49-1 Mirai 8000 18,000,000 5,410,562,000
Scenario 5 Malicious CTU-IoT-Malware-Cap-52-1 Mirai 24,000 64,000,000 19,781,379,000
Scenario 6 Malicious CTU-IoT-Malware-Cap-20-1 Torii 24,000 50,000 3,210,000
Scenario 7 Malicious CTU-IoT-Malware-Cap-21-1 Torii 24,000 50,000 3,287,000
Scenario 8 Malicious CTU-IoT-Malware-Cap-42-1 Trojan 8000 24,000 4,427,000
Scenario 9 Malicious CTU-IoT-Malware-Cap-60-1 Gagfyt 24,000 271,000,000 3,581,029,000
Scenario 10 Malicious CTU-IoT-Malware-Cap-17-1 Kenjiro 24,000 109,000,000 54,659,864,000
Scenario 11 Malicious CTU-IoT-Malware-Cap-36-1 Okiru 24,000 13,000,000 13,645,107,000
Scenario 12 Malicious CTU-IoT-Malware-Cap-33-1 Kenjiro 24,000 54,000,000 54,454,592,000