Now 1111 visitors
Today:81 Yesterday:1070
Total: 5119 413S 88P 97R
2026-02-17, Week 8
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Program / Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220314 Question.7
Questioner: ycc.nttu@gmail.com    2022-02-17 ¿ÀÀü 12:30:46
IEEE/ICACT20220314 Answer.7
Answer by Auhor nay.min@student.mahidol.ac.th   2022-02-17 ¿ÀÀü 12:30:46
Thank you for your analysis and discussion of this new AIoT-Sol dataset for anomalous activity detections in IoT networks. Would you please let us know how to select 17 relevant attack types to produce a comprehensive dataset? Thank you for your interest in our dataset. Initially, we prioritize having a dataset with benign and anomaly traffic. And then we categorize them into a category class: Network, DDoS, Web, Web IoT Message Protocol Attacks. As for the 17 attack types, we tried to decide under the four categories. After considering the constraints of testbed and attack types, we came up with possible attack types that we can perform. However, a comprehensive dataset is not limited to 17 attack types only.

Select Voice