IIoT Network Traffic โ 15% Attacks [10K rows] #7a6f
Synthetic Network Security dataset with 10,000 data points. 9 columns. Config: Attack rate: 15%. CC0 licensed.
View DatasetShowing 12 of 24 datasets
Synthetic Network Security dataset with 10,000 data points. 9 columns. Config: Attack rate: 15%. CC0 licensed.
View DatasetSynthetic Cybersecurity dataset with 500 data points. 14 columns. Config: Attack rate: 18%. CC0 licensed.
View DatasetReproducible large-scale IoT network dataset from 78 emulated devices using MQTT, CoAP, and RTSP protocols. Includes benign and malicious traffic with DoS, brute force, scanning, and C&C attacks in PCAP and CSV formats.
View DatasetReleased in October 2025, this dataset captures performance metrics and network traffic associated with implementing Post-Quantum Cryptography (PQC) in Industrial IoT (IIoT) scenarios. It supports research into the feasibility and overhead of quantum-resistant security protocols on resource-constrained industrial hardware.
View DatasetCICIoT2023 is a large-scale, flow-based network traffic dataset capturing real-time benign and malicious communications in an IoT environment composed of 105 physical devices. The dataset captures traffic traces for 33 attack scenarios grouped into seven categories: DDoS, DoS, Reconnaissance, web-based attacks, brute-force attempts, spoofing, and Mirai malware.
View DatasetMQTT_UAD is a public MQTT traffic dataset published in Data in Brief 2025, containing labeled benign and attack scenarios in IoT networks that use the MQTT protocol, designed for training and evaluating intrusion detection systems.
View DatasetAn MQTT DoS and DDoS IoT attack dataset collected on a Raspberry Pi 3B+ Mosquitto broker over 12 sessions, including three days of normal traffic and several minutes of attack traffic, totaling 424,716 labeled entries for machine learning-based IDS and IPS research.
View DatasetA real-world MQTT-based IoT cybersecurity dataset collected from the MQTTEEB testbed at the International University of Rabat, with benign traffic and five attack types (DoS, SlowITe, Malformed Data Injection, Brute Force, Publish Flooding), provided in multiple processed forms (raw, cleaned, normalized, standardized, SMOTE) for AI-driven intrusion detection research.
View DatasetA merged and optimized dataset combining N-BaIoT (IoT-specific traffic) and UNSW-NB15 (general network threats) with feature engineering, dimensionality reduction, and benchmarked ML models (Decision Tree, SVM, Random Forest, Neural Network) for IoT anomaly detection, published in Scientific Reports.
View DatasetA federated learning evaluation across several contemporary IoT and IIoT intrusion detection datasets, benchmarking algorithms such as FedAvg, FedProx, and FedNova with LSTM and Transformer models in in-domain, cross-dataset, and multi-dataset federation scenarios.
View DatasetIoT-DH is a real-world IoT DDoS honeypot dataset collected from a honeypot deployment and converted from PCAP to CSV with traffic features and labels for DDoS classification, identification, and detection tasks.
View DatasetMultimodal dataset combining Text-to-SQL natural language queries with IoT network traffic classification, featuring 10,985 SQL training examples and labeled network traffic (benign/malicious) from IoT-23 and Smart Building sensors for NLP and security research.
View Dataset