Skip to main content
University

CICIoT2023: Real-Time IoT Attack Dataset [47M+ Labeled Flows, 33 Attack Types]

Network Security
35 views
2 min read

Abstract

"Large-scale IoT cybersecurity dataset with 47M+ labeled network flows from 105 real IoT devices across 33 attack types in 7 categories. PCAP and CSV formats. Built for IDS/IPS development and ML-based IoT traffic classification research."

Description

Overview

CICIoT2023 is a comprehensive, real-time IoT network traffic dataset created by the Canadian Institute for Cybersecurity (CIC) at the University of New Brunswick. It was designed to address the growing demand for realistic, large-scale IoT attack data to foster the development of intrusion detection systems and security analytics tools tailored to IoT environments.

The dataset was generated using a testbed of 105 heterogeneous IoT devices — including smart cameras, sensors, microcontrollers, and Zigbee/Z-Wave endpoints — organized across five home automation hubs. Critically, attacks were performed by malicious IoT devices targeting other IoT devices, reflecting the realistic lateral-movement threat model in smart environments.

33 distinct attack types are included, hierarchically grouped into seven broad categories: DDoS, DoS, Reconnaissance, Web-based, Brute Force, Spoofing, and Mirai. Each bidirectional flow record contains 45–46 numeric features extracted from PCAP captures. The compressed dataset occupies approximately 2.7 GB and expands to ~13 GB when uncompressed.

Column Schema

ColumnDescription
flow_durationDuration of the network flow in microseconds.
Header_LengthTotal header length of the flow packets.
Protocol TypeProtocol identifier (TCP, UDP, ICMP, etc.).
DurationFlow duration value in alternate unit.
RateFlow packet rate.
Srate / DrateSource and destination packet rates.
fin_flag_number … urg_flag_numberTCP flag counts per flow (FIN, SYN, RST, PSH, ACK, ECE, URG).
Magnitude / Radius / Covariance / VarianceStatistical features derived from packet size and timing.
labelAttack class label: Benign or one of 33 attack types.

Key Statistics

  • Total Flows: 47,665,723 labeled records
  • Benign flows: ~42.6M (89.4%); Attack flows: ~5M (10.6%)
  • Attack Types: 33 across 7 categories
  • IoT Devices: 105 (67 active + 38 Zigbee/Z-Wave)
  • Features: 45–46 per flow record (CSV)
  • File Format: PCAP and CSV
  • Compressed size: ~2.7 GB; Uncompressed: ~13 GB
  • Published: 2023

Use Cases

  • IoT intrusion detection system (IDS/IPS) development and benchmarking
  • Multi-class and binary attack classification using ML/DL algorithms
  • Federated learning and LLM-based IoT security research
  • DDoS, Mirai botnet, and spoofing detection in smart home environments

Source & Attribution

Created by Neto et al. at the Canadian Institute for Cybersecurity, University of New Brunswick. Published in Sensors (MDPI) 2023. The dataset is freely downloadable from the CIC website and also mirrored on Kaggle.

View Data Structure

To explore column names, data types, and sample rows, visit the official dataset page on University.

Preview on University

Cite This Dataset

Neto, Euclides Carlos Pinto, Dadkhah, Sajjad, Ferreira, Raphael, Zohourian, Arash, Lu, Rongxing, & Ghorbani, Ali A. (2023). CICIoT2023: Real-Time IoT Attack Dataset [47M+ Labeled Flows, 33 Attack Types]. Sensors. [Dataset]. MDPI. https://www.unb.ca/cic/datasets/iotdataset-2023.html

Source: MDPI (2023)

Indexed by IoTDataset.com on Apr 13, 2026

Ready to Start Your Research?

Download this dataset directly from the official repository and start building your next breakthrough project.

Download Dataset

Related Topics & Keywords

Share This Research

More in Network Security

View All
Network Security IoTSyn Generated

IIoT Network Traffic - 29% Attacks [10K rows] #8d6c

Synthetic IIoT network traffic dataset for SCADA/ICS intrusion detection research. 10,000 labeled flow records, 16 features. Protocols: Modbus TCP, OPC UA, DNP3, MQTT, BACnet, EtherNet/IP. Attack rate: 29% covering MitM, Replay, False Data Injection, DoS, and Reconnaissance. Generated by IoTSyn v3.2. CC0 licensed.

Apr 30, 2026
Network Security University

TON_IoT: UNSW Telemetry, Network & OS Attack Traces [Multi-Source IIoT]

Heterogeneous IoT/IIoT dataset from UNSW Canberra Cyber Range with network traffic, Windows/Linux OS traces, and IoT sensor telemetry. Labeled for 9 attack types including DoS, DDoS, ransomware, and XSS. CSV and PCAP formats. Benchmark for AI-based IDS evaluation.

Apr 13, 2026
Network Security UCI

RT-IoT2022: Real-Time IoT IDS Dataset [41 Features, Multi-Attack]

Real-time IoT network security dataset from a live IoT infrastructure with 41 bidirectional flow features. Includes ThingSpeak-LED, Wipro-Bulb, and MQTT-Temp devices with SSH brute force, DDoS (Hping/Slowloris), and Nmap attack scenarios. CSV format. Used for adaptive IDS development.

Apr 13, 2026
Network Security Kaggle

IoTID20: IoT Network Intrusion Dataset [625K Flows, 4 Attack Types, 83 Features]

Smart-home-derived IoT botnet dataset with 625,783 labeled flow records and 83 network features. Covers DoS, Mirai, MITM, and Scan attacks from EZVIZ and SKT NGU Wi-Fi cameras. CSV format. Supports binary, category, and sub-category IDS classification tasks.

Apr 13, 2026