Skip to main content
University

TON_IoT: UNSW Telemetry, Network & OS Attack Traces [Multi-Source IIoT]

Network Security
175 views
2 min read
License

Abstract

"Heterogeneous IoT/IIoT dataset from UNSW Canberra Cyber Range with network traffic, Windows/Linux OS traces, and IoT sensor telemetry. Labeled for 9 attack types including DoS, DDoS, ransomware, and XSS. CSV and PCAP formats. Benchmark for AI-based IDS evaluation."

Description

Overview

The TON_IoT dataset is a next-generation cybersecurity benchmark developed by the Cyber Range and IoT Labs at UNSW Canberra, Australian Defence Force Academy. It is designed to evaluate the fidelity and efficiency of AI-based cybersecurity applications including intrusion detection systems, malware detection, threat hunting, and digital forensics in Industry 4.0 and IoT/IIoT environments.

Unlike single-source datasets, TON_IoT integrates heterogeneous data streams collected in parallel: network traffic (PCAP and Zeek/Bro logs), Windows OS audit traces, Linux OS audit traces, and IoT sensor telemetry from more than 10 devices including weather sensors and Modbus industrial controllers. This multi-source structure closely mirrors real enterprise IoT deployments.

Nine attack categories are represented — DoS, DDoS, ransomware, backdoor, data injection, XSS, password cracking, scanning, and man-in-the-middle — all launched across IoT gateways, MQTT protocols, Node-Red web applications, Linux, Windows, and cloud systems using Kali Linux attack machines.

Column Schema

ColumnDescription
tsTimestamp of the network event.
src_ip / dst_ipSource and destination IP addresses.
src_port / dst_portSource and destination port numbers.
protoNetwork protocol (TCP, UDP, ICMP, etc.).
serviceDetected application-layer service.
durationDuration of the connection in seconds.
orig_bytes / resp_bytesBytes sent by originator and responder.
labelBinary label: 0 = Normal, 1 = Attack.
typeSpecific attack type (dos, ddos, ransomware, etc.).

Key Statistics

  • Data Sources: Network traffic, Windows OS, Linux OS, IoT sensor telemetry
  • IoT Sensors: 10+ devices (weather, Modbus, GPS tracker, fridge, garage door, etc.)
  • Attack Types: 9 categories
  • File Formats: CSV, LOG (Zeek/Bro), PCAP
  • Features: 44 network flow features (network sub-dataset)
  • Published: 2019–2020

Use Cases

  • AI-based IoT intrusion detection and anomaly detection
  • Multi-class attack classification across network and OS telemetry layers
  • Ransomware and backdoor detection in IIoT networks
  • Digital forensics and adversarial ML evaluation in IoT environments

Source & Attribution

Created by Nour Moustafa and colleagues at the Cyber Range Research Group, UNSW Canberra. Published through IEEE Dataport and documented in multiple journal articles. The dataset page at UNSW Research provides direct access to downloads.

View Data Structure

To explore column names, data types, and sample rows, visit the official dataset page on University.

Preview on University

Cite This Dataset

Moustafa, Nour (2021). TON_IoT: UNSW Telemetry, Network & OS Attack Traces [Multi-Source IIoT]. Sustainable Cities and Society. [Dataset]. Elsevier. https://research.unsw.edu.au/projects/toniot-datasets

Source: Elsevier (2021)

Indexed by IoTDataset.com on Apr 13, 2026

Ready to Start Your Research?

Download this dataset directly from the official repository and start building your next breakthrough project.

Download Dataset

Related Topics & Keywords

Share This Research

More in Network Security

View All
Network Security IoTSyn Generated

IIoT Network Traffic - 29% Attacks [10K rows] #8d6c

Synthetic IIoT network traffic dataset for SCADA/ICS intrusion detection research. 10,000 labeled flow records, 16 features. Protocols: Modbus TCP, OPC UA, DNP3, MQTT, BACnet, EtherNet/IP. Attack rate: 29% covering MitM, Replay, False Data Injection, DoS, and Reconnaissance. Generated by IoTSyn v3.2. CC0 licensed.

Apr 30, 2026
Network Security University

CICIoT2023: Real-Time IoT Attack Dataset [47M+ Labeled Flows, 33 Attack Types]

Large-scale IoT cybersecurity dataset with 47M+ labeled network flows from 105 real IoT devices across 33 attack types in 7 categories. PCAP and CSV formats. Built for IDS/IPS development and ML-based IoT traffic classification research.

Apr 13, 2026
Network Security UCI

RT-IoT2022: Real-Time IoT IDS Dataset [41 Features, Multi-Attack]

Real-time IoT network security dataset from a live IoT infrastructure with 41 bidirectional flow features. Includes ThingSpeak-LED, Wipro-Bulb, and MQTT-Temp devices with SSH brute force, DDoS (Hping/Slowloris), and Nmap attack scenarios. CSV format. Used for adaptive IDS development.

Apr 13, 2026
Network Security Kaggle

IoTID20: IoT Network Intrusion Dataset [625K Flows, 4 Attack Types, 83 Features]

Smart-home-derived IoT botnet dataset with 625,783 labeled flow records and 83 network features. Covers DoS, Mirai, MITM, and Scan attacks from EZVIZ and SKT NGU Wi-Fi cameras. CSV format. Supports binary, category, and sub-category IDS classification tasks.

Apr 13, 2026