Table 1 NF-ToN-IoT distribution.

From: A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms

Class

Count

Description

Benign

1550712

Common benign flows

Backdoor

17247

A mechanism that reacts to specifically created client applications to target systems with remote access

DoS

17717

Attempting to prevent data access or availability by overwhelming a computer system’s resources.

DDoS

326345

An attempt was made using several dispersed sources that are comparable to DoS.

MITM

1295

“Man in the Middle” attacks allow hackers to eavesdrop on victim-host communications by inserting themselves in the midst of the conversation.

Password

156299

Includes a range of techniques designed to recover passwords via sniffer or brute force methods.

Ransomware

142

Attacks in which the decryption technique or key is sought as payment to decode data on a host

Scanning

21467

This category, which encompasses several techniques for discovering hosts and networks, is often known as probing.

XSS

99944

When hackers insert malicious code into web applications, they engage in cross-site scripting.