Skip to main content

ot security Datasets - Free IoT Data for Research

Showing 12 of 24 datasets

Clear Filters
Kaggle
Industrial IoT Feb 06, 2026

Post-Quantum Cryptography Impact in Industrial IoT

Released in October 2025, this dataset captures performance metrics and network traffic associated with implementing Post-Quantum Cryptography (PQC) in Industrial IoT (IIoT) scenarios. It supports research into the feasibility and overhead of quantum-resistant security protocols on resource-constrained industrial hardware.

CIC Repository
Cybersecurity Feb 05, 2026

CICIoT2023: Large-Scale IoT Attack Traffic Dataset

CICIoT2023 is a large-scale, flow-based network traffic dataset capturing real-time benign and malicious communications in an IoT environment composed of 105 physical devices. The dataset captures traffic traces for 33 attack scenarios grouped into seven categories: DDoS, DoS, Reconnaissance, web-based attacks, brute-force attempts, spoofing, and Mirai malware.

Data in Brief (Elsevier) + Mendeley Data

MQTTEEB-D: A Real-World IoT Cybersecurity Dataset for AI-Powered Threat Detection in MQTT Networks

A real-world MQTT-based IoT cybersecurity dataset collected from the MQTTEEB testbed at the International University of Rabat, with benign traffic and five attack types (DoS, SlowITe, Malformed Data Injection, Brute Force, Publish Flooding), provided in multiple processed forms (raw, cleaned, normalized, standardized, SMOTE) for AI-driven intrusion detection research.

Scientific Reports (Nature Publishing Group)

Securing IoT Networks: A Machine Learning Approach for Detecting Unusual Traffic Patterns

A merged and optimized dataset combining N-BaIoT (IoT-specific traffic) and UNSW-NB15 (general network threats) with feature engineering, dimensionality reduction, and benchmarked ML models (Decision Tree, SVM, Random Forest, Neural Network) for IoT anomaly detection, published in Scientific Reports.

Scientific Reports (Nature Publishing Group)

Dataset-Centric Evaluation of Federated Intrusion Detection Models in IoT Networks

A federated learning evaluation across several contemporary IoT and IIoT intrusion detection datasets, benchmarking algorithms such as FedAvg, FedProx, and FedNova with LSTM and Transformer models in in-domain, cross-dataset, and multi-dataset federation scenarios.