Table 3 Dataset Comparison.
From: Robust IoT security using isolation forest and one class SVM algorithms
Dataset | Domain | Data sources | Typical attacks | Strengths | Limitations |
|---|---|---|---|---|---|
TON_IoT | IoT/IIoT | Sensors, OS logs, network | DoS, DDoS, scanning, exfil | Heterogeneous, IoT-specific, labeled | Class imbalance |
BoT-IoT | IoT | Network traffic | Botnet-based (DDoS, DoS) | Large scale, detailed attack flows | Highly imbalanced |
CICIDS2017 | IT | Network traffic | DoS, DDoS, brute force, web | Standard baseline, widely cited | Not IoT-specific |