Table 3 Description of IoT datasets.
From: Secure IoT data dissemination with blockchain and transfer learning techniques
Dataset | Attacks | Size of dataset |
|---|---|---|
ToN-IoT 1 | Dos, ddos | 40,000 |
ToN-IoT 2 | Backdoor | 20,000 |
ToN-IoT 3 | Injection | 20,000 |
ToN-IoT 4 | Ransomware | 20,000 |
ToN-IoT 5 | Scanning | 20,000 |
ToN-IoT 6 | Cross-site scripting | 20,000 |
ToN-IoT 7 | Man-in-the-middle | 1043 |
ToN-IoT 8 | Password | 20,000 |