From: Survey of intrusion detection systems: techniques, datasets and challenges
Dataset | Realistic Traffic | Label data | IoT traces | Zero-day attacks | Full packet captured | Year |
---|---|---|---|---|---|---|
DARPA 98 | ✔ | ✔ | ✖ | ✖ | ✔ | 1998 |
KDDCUP 99 | ✔ | ✔ | ✖ | ✖ | ✔ | 1999 |
CAIDA | ✔ | ✖ | ✖ | ✖ | ✖ | 2007 |
NSL-KDD | ✔ | ✔ | ✖ | ✖ | ✔ | 2009 |
ISCX 2012 | ✔ | ✔ | ✖ | ✖ | ✔ | 2012 |
ADFA-WD | ✔ | ✔ | ✖ | ✔ | ✔ | 2014 |
ADFA-LD | ✔ | ✔ | ✖ | ✔ | ✔ | 2014 |
CICIDS2017 | ✔ | ✔ | ✖ | ✔ | ✔ | 2017 |
Bot-IoT | ✔ | ✔ | ✔ | ✔ | ✔ | 2018 |