JOURNAL ARTICLE

Overview of the CICIoT2023 Dataset for Internet of Things Intrusion Detection Systems

Wisam Ali Hussein SalmanHuah Yong Chan

Year: 2025 Journal:   Mesopotamian Journal of Big Data Vol: 2025 Pages: 50-60

Abstract

The rapid expansion of the use of the Internet of Things (IoT) has encouraged many attackers to exploit the vulnerabilities in these networks to violate data privacy or disrupt service; they are easy targets due to the diversity of devices within the network, which has led to the loss of unified security standards. intrusion detection system (IDS) play a pivotal role in securing IoT networks by monitoring inbound and outbound traffic to these networks and issuing a security alarm when there is an attack; moreover, they respond directly to these security threats to prevent them from harming the network and violating data privacy. To design an IDS capable of performing work with high efficiency, an appropriate dataset must be chosen to train and evaluate the designed model. This dataset works as a fundamental task in the success of these systems because it plays a major role in training the system, feature engineering, evaluating the performance of the model, and other tasks. This paper focused on one of the modern datasets used in training and evaluating IDS models, that is, the CICIOT2023 dataset. The CICIOT2023 dataset is distinguished from other datasets, such as CICIDS2017, UNSW-NB15, and KDD1999. It focuses on the IoT environment, unlike other datasets that focus on data traffic in traditional networks, and it uses a variety of devices and protocols; moreover, it contains modern and complex attacks and a balance between the data of those attacks and normal traffic. This paper discusses the structure of the dataset, the kinds of attacks it contains, the applications and fields in which it is used, the strengths that distinguish it from other datasets, its role in developing cybersecurity research, the most important studies that have been written and dealt with this dataset, and finally, the future visions for developing the dataset.

Keywords:
Intrusion detection system Internet of Things Computer science The Internet Data mining Computer security World Wide Web

Metrics

2
Cited By
10.33
FWCI (Field Weighted Citation Impact)
0
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Intrusion Detection Systems for Internet of Things

K GayathriTony Thomas

Advances in information security, privacy, and ethics book series Year: 2020 Pages: 148-171
JOURNAL ARTICLE

Ensemble-Based Intrusion Detection for IoT Networks Using the CICIoT2023 Dataset

Deepa Venkataraya Premalatha

Journal:   Journal of Information Systems Engineering & Management Year: 2025 Vol: 10 (21s)Pages: 743-755
JOURNAL ARTICLE

Two-step data clustering for improved intrusion detection system using CICIoT2023 dataset

Hadeel Qasem GheniWathiq Laftah Al-Yaseen

Journal:   e-Prime - Advances in Electrical Engineering Electronics and Energy Year: 2024 Vol: 9 Pages: 100673-100673
JOURNAL ARTICLE

Overview on Intrusion Detection Schemes for Internet of Things (IoT)

Saher GhayyadShengzhi Du

Journal:   2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC) Year: 2018 Pages: 1-6
© 2026 ScienceGate Book Chapters — All rights reserved.