Table 3 Dataset Comparison.

From: Robust IoT security using isolation forest and one class SVM algorithms

Dataset

Domain

Data sources

Typical attacks

Strengths

Limitations

TON_IoT

IoT/IIoT

Sensors, OS logs, network

DoS, DDoS, scanning, exfil

Heterogeneous, IoT-specific, labeled

Class imbalance

BoT-IoT

IoT

Network traffic

Botnet-based (DDoS, DoS)

Large scale, detailed attack flows

Highly imbalanced

CICIDS2017

IT

Network traffic

DoS, DDoS, brute force, web

Standard baseline, widely cited

Not IoT-specific