Real name: 
Congratulations! You are an IEEE DataPort Subscriber! Your benefits as a subscriber include full access to all IEEE DataPort datasets. You may also upload your own datasets to IEEE DataPort (up to 2TB) and/or consider initiating a Competition on IEEE DataPort.  Thank you!
First Name: 
Murat
Last Name: 
EMEC

Datasets & Competitions

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
1979 Views