This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


The BoT-IoT Dataset
External Dataset
External Data Source
55 (lowest rank is 55)

Category & Restrictions

simulated attacks, denial of service, network data, cyber attack, iot, packet captures


The BoT-IoT dataset was created by designing a realistic network environment in the Cyber Range Lab of The center of UNSW Canberra Cyber. The environment incorporates a combination of normal and botnet traffic. The dataset's source files are provided in different formats, including the original pcap files, the generated argus files and csv files.

The dataset has captured pcap files that are 69.3 GB in size, with more than 72.000.000 records. The extracted flow traffic, in csv format is 16.7 GB in size. The dataset includes DDoS, DoS, OS and Service Scan, Keylogging and Data exfiltration attacks, with the DDoS and DoS attacks further organized, based on the protocol used.

Additional Details

cybercrime, network analyzers, spamming, bot, dos, university of new south wales, group of eight, external data source, universities and colleges, keystroke logging, spyware, pcap, text, malware, source code, 1296, inferlink corporation, denial of service attack, universities in sydney, cyberwarfare, service scan, cryptanalysis, botnet, the bot-iot dataset, internet relay chat, exploit