Skip to main content
Kaggle

Cybersecurity dataset of water distribution plant communications under replay attacks

Cybersecurity
Feb 08, 2026
27 views
License

Abstract

"Dataset documents replay attacks targeting MQTT communications in water distribution system with 4.8 MB CSV file containing original and replayed messages for temporal sequence analysis."

Description

This dataset documents replay attacks targeting MQTT communications in a water distribution level control system. The attacks affect both directions of communication: replaying historical control commands from PC to plants, and replaying process parameter messages from plants to PC.

When a message arrives at the broker during an active attack campaign, a replay sequence triggers 1-20 previously recorded messages of the same type to be resent. Messages preserve original sampling time, producing syntactically valid but temporally inconsistent traffic.

The dataset enables temporal sequence analysis and comparison between original and replayed messages, with attack campaigns having variable durations separated by realistic cooldown periods. Created as part of strategic project between INCIBE and University of A Coruña.

📊 View Data Structure

To explore column names, data types, and sample rows, visit the official dataset page on Kaggle.

Preview on Kaggle

Cite This Dataset

Jove, E., Calvo-Rolle, J. L., Álvarez-Crespo, M. M., García-Fischer, A., Michelena, Á., & Naveira Rocamonde, P. (2026). Cybersecurity dataset of water distribution plant communications under replay attacks. [Dataset]. {Zenodo. https://doi.org/10.5281/zenodo.18405349

Select your preferred citation style above. The citation will automatically update and you can copy it to your clipboard.

Original source: {Zenodo (2026). Visit official page for more details.

Indexed by IoTDataset.com on Feb 08, 2026

Ready to Start Your Research?

Download this dataset directly from the official repository and start building your next breakthrough project.

Download Dataset

Related Topics & Keywords

Share This Research

More in Cybersecurity

View All