Table 3 Description of IoT datasets.

From: Secure IoT data dissemination with blockchain and transfer learning techniques

Dataset

Attacks

Size of dataset

ToN-IoT 1

Dos, ddos

40,000

ToN-IoT 2

Backdoor

20,000

ToN-IoT 3

Injection

20,000

ToN-IoT 4

Ransomware

20,000

ToN-IoT 5

Scanning

20,000

ToN-IoT 6

Cross-site scripting

20,000

ToN-IoT 7

Man-in-the-middle

1043

ToN-IoT 8

Password

20,000