<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-18T20:35:09Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/11497" metadataPrefix="etdms">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/11497</identifier><datestamp>2026-04-08T11:34:34Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_8557</setSpec><setSpec>col_10259_5684</setSpec></header><metadata><thesis xmlns="http://www.ndltd.org/standards/metadata/etdms/1.0/" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.ndltd.org/standards/metadata/etdms/1.0/ http://www.ndltd.org/standards/metadata/etdms/1.0/etdms.xsd">
<title>Labeled IoT Window-Based Random Network Pattern Dataset for Reinforcement Learning</title>
<creator>Rodríguez Villagrá, César</creator>
<creator>Martin Reizabal, Sergio</creator>
<creator>Ruiz González, Rubén</creator>
<creator>Basurto Hornillos, Nuño</creator>
<creator>Herrero Cosío, Álvaro</creator>
<subject>Internet of things</subject>
<subject>Cybersecurity</subject>
<subject>Attack Traffic</subject>
<subject>Benign traffic</subject>
<subject>Network</subject>
<subject>DDoS</subject>
<subject>DoS</subject>
<subject>Reinforcement learning</subject>
<description>This dataset is designed to support the training and evaluation of&#xd;
reinforcement learning models in the context of network traffic&#xd;
analysis. It is derived from an existing IoT network traffic dataset,&#xd;
from which packet capture (pcap) files were selected and processed&#xd;
following a custom methodology explained in [Methodological&#xd;
Information](methodological-information). The resulting data&#xd;
representation is based on a windowing approach, where network traffic&#xd;
is segmented into fixed-size temporal windows.&#xd;
&#xd;
Each window aggregates traffic instances and is labeled according to its&#xd;
composition as benign, attack, or mixed (containing both benign and&#xd;
malicious activity). The final datasets are generated through random&#xd;
combinations of these windows, enabling the creation of diverse traffic&#xd;
patterns that better reflect dynamic and random network conditions.&#xd;
&#xd;
This structure facilitates the use of the dataset in reinforcement&#xd;
learning scenarios, where agents must learn to identify, classify, or&#xd;
respond to varying traffic behaviors over time. Additionally, the&#xd;
evaluation datasets are generated following the same methodology as the&#xd;
training datasets, but are kept separate and are not used during the&#xd;
training process, allowing for an independent evaluation of model&#xd;
performance.</description>
<date>2026-04-08</date>
<date>2026-04-08</date>
<date>2026-04-12</date>
<type>dataset</type>
<identifier>https://hdl.handle.net/10259/11497</identifier>
<identifier>10.71486/pzvm-3z31</identifier>
<language>eng</language>
<rights>http://creativecommons.org/licenses/by/4.0/</rights>
<rights>info:eu-repo/semantics/openAccess</rights>
<rights>Atribución 4.0 Internacional</rights>
<publisher>Universidad de Burgos</publisher>
</thesis></metadata></record></GetRecord></OAI-PMH>