Data underlying the publication: “Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation"

DOI:10.4121/69d111e7-30e6-4206-b27d-22a5f4e33722.v1
The DOI displayed above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future. For a link that will always point to the latest version, please use
DOI: 10.4121/69d111e7-30e6-4206-b27d-22a5f4e33722

Datacite citation style

Al Alsadi, Arwa (2025): Data underlying the publication: “Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation". Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/69d111e7-30e6-4206-b27d-22a5f4e33722.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite

Dataset

This repository contains the source code for our exploit prediction model, as well as detailed descriptions and links for each dataset used in this study:


1. Model source code: The R code used for predicting and explaining exploitation in IoT vulnerabilities is included. All necessary instructions for running the model are provided in the README file within the ZIP archive.


2. You can use the following sources to collect the data used in the model:

2.1. IoT Vulnerabilities:

2.1.1 VARIoT: https://www.variot.eu/


2.2. Targeted IoT Vulnerabilities:

2.2.1. VirusTotal: https://www.virustotal.com

2.2.2. CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

2.2.3. VulnCheck KEV: https://vulncheck.com/kev

2.2.4. AttackerKB: https://attackerkb.com

2.2.5. Google Project Zero: https://googleprojectzero.blogspot.com/

2.2.6. Honeypots such as IoTPOT and X-Pot: https://sec.ynu.codes/iot/


2.3. Vulnerability Features:

2.3.1. NVD: https://nvd.nist.gov/


2.4. Exploitability Features:

2.4.1. ExploitDB: https://www.exploit-db.com/


2.5. Hacking Community Features:

2.5.1 CrimeBB: https://www.cambridgecybercrime.uk/datasets.html


History

  • 2025-05-23 first online, published, posted

Publisher

4TU.ResearchData

Organizations

TU Delft, Faculty of Technology, Policy and Management, Department of Multi Actor Systems.

DATA

Files (5)