100+ datasets found
  1. Incidents of cyber attacks in India 2015-2022

    • statista.com
    Updated Nov 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Incidents of cyber attacks in India 2015-2022 [Dataset]. https://www.statista.com/statistics/1201177/india-number-of-cyber-attacks/
    Explore at:
    Dataset updated
    Nov 28, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    India
    Description

    More than *** million cyberattacks were reported across India in 2022. This was a significant increase compared to 2019. The country was among the top **** with the most number of cybersecurity incidents that year. Furthermore, India ranked ***** in terms of internet user numbers.

  2. Cyber security breaches survey 2022

    • gov.uk
    • s3.amazonaws.com
    Updated Jul 11, 2022
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Department for Digital, Culture, Media & Sport (2022). Cyber security breaches survey 2022 [Dataset]. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022
    Explore at:
    Dataset updated
    Jul 11, 2022
    Dataset provided by
    GOV.UKhttp://gov.uk/
    Authors
    Department for Digital, Culture, Media & Sport
    Description

    The government has surveyed UK businesses, charities and educational institutions to find out how they approach cyber security and gain insight into the cyber security issues they face. The research informs government policy on cyber security and how government works with industry to build a prosperous and resilient digital UK.

    For more information you can read the press notice.

    Published

    30 March 2022

    Period covered

    Respondents were asked about their approach to cyber security and any breaches or attacks over the 12 months before the interview. Main survey interviews took place between October 2021 and January 2022. Qualitative follow up interviews took place in December 2021 and January 2022.

    Geographic coverage

    UK

    Further Information

    The survey is part of the government’s National Cyber Strategy. Cyber security guidance and information for businesses, including details of free training and support, can be found on the National Cyber Security Centre website.

    The survey was carried out by Ipsos UK.

    The UK Statistics Authority

    This release is published in accordance with the Code of Practice for Statistics (2018), as produced by the UK Statistics Authority. The UKSA has the overall objective of promoting and safeguarding the production and publication of official statistics that serve the public good. It monitors and reports on all official statistics, and promotes good practice in this area.

    Pre-release access

    The document above contains a list of ministers and officials who have received privileged early access to this release. In line with best practice, the list has been kept to a minimum and those given access for briefing purposes had a maximum of 24 hours.

    Contact information

    The responsible analyst and statistician for this release is Maddy Ell. For any queries please contact cybersurveys@dsit.gov.uk.

  3. Global number of breached user accounts Q1 2020-Q3 2025

    • statista.com
    Updated Oct 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of breached user accounts Q1 2020-Q3 2025 [Dataset]. https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Oct 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    During the third quarter of 2025, data breaches exposed more than ** million records worldwide. Since the first quarter of 2020, the highest number of data records were exposed in the third quarter of ****, more than **** billion data sets. Data breaches remain among the biggest concerns of company leaders worldwide. The most common causes of sensitive information loss were operating system vulnerabilities on endpoint devices. Which industries see the most data breaches? Meanwhile, certain conditions make some industry sectors more prone to data breaches than others. According to the latest observations, the public administration experienced the highest number of data breaches between 2021 and 2022. The industry saw *** reported data breach incidents with confirmed data loss. The second were financial institutions, with *** data breach cases, followed by healthcare providers. Data breach cost Data breach incidents have various consequences, the most common impact being financial losses and business disruptions. As of 2023, the average data breach cost across businesses worldwide was **** million U.S. dollars. Meanwhile, a leaked data record cost about *** U.S. dollars. The United States saw the highest average breach cost globally, at **** million U.S. dollars.

  4. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  5. D

    Data Security Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Jun 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Data Security Market Report [Dataset]. https://www.marketreportanalytics.com/reports/data-security-market-89570
    Explore at:
    pdf, ppt, docAvailable download formats
    Dataset updated
    Jun 21, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global data security market, valued at $28.88 billion in 2025, is experiencing robust growth, projected to expand at a compound annual growth rate (CAGR) of 18.78% from 2025 to 2033. This significant expansion is driven by several key factors. The increasing sophistication and frequency of cyberattacks targeting businesses and individuals necessitate robust security measures. The rising adoption of cloud computing and the Internet of Things (IoT) expands the attack surface, further fueling demand for advanced data security solutions. Furthermore, stringent government regulations regarding data privacy, such as GDPR and CCPA, compel organizations to invest heavily in compliance-driven security infrastructure. Leading players like IBM, Cisco, Microsoft, and others are actively innovating and expanding their product portfolios to cater to this escalating demand, resulting in a highly competitive yet dynamic market landscape. The market's growth trajectory is further influenced by evolving threat landscapes. Advanced persistent threats (APTs), ransomware attacks, and data breaches are becoming increasingly complex and challenging to mitigate. This necessitates continuous investment in advanced security technologies like artificial intelligence (AI) and machine learning (ML) for threat detection and response. While the market faces restraints such as the high cost of implementation and the shortage of skilled cybersecurity professionals, the overall growth prospects remain exceptionally positive, driven by the fundamental need to safeguard sensitive data in an increasingly interconnected world. Market segmentation, while not explicitly provided, likely includes solutions categorized by type (endpoint security, cloud security, network security, data loss prevention), deployment model (on-premise, cloud-based), and industry vertical (finance, healthcare, government). The forecast period of 2025-2033 indicates significant future market expansion based on current growth trends. Recent developments include: July 2022 - Trellix has achieved Amazon Web Services (AWS) Security Competency status in the Data security and protection category by developing a solution that identifies and responds to millions of malicious objects and URLs daily. This designation honors Trellix's extensive technical expertise and proven success in assisting customers in enhancing their security, especially in the cloud sector., June 2022 - Comforte AG, an enterprise data security provider, and M² Business Consulting GmbH have launched a new relationship to help large enterprises in the DACH region adapt to new and emerging IT more rapidly and securely. This partnership enables digital innovation in organizations looking to apply data analytics securely and adopt data privacy standards to protect crucial data, thus ensuring growth in the data security market.. Key drivers for this market are: Rise in Digitization Trends and Digital Data Production, Increase in Data Security Technologies. Potential restraints include: Rise in Digitization Trends and Digital Data Production, Increase in Data Security Technologies. Notable trends are: Data Security Technologies As the Greatest Asset.

  6. Cyber Attacks on Real-Time Internet of Things

    • kaggle.com
    zip
    Updated Jan 17, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Joakim Arvidsson (2024). Cyber Attacks on Real-Time Internet of Things [Dataset]. https://www.kaggle.com/datasets/joebeachcapital/real-time-internet-of-things-rt-iot2022
    Explore at:
    zip(7641918 bytes)Available download formats
    Dataset updated
    Jan 17, 2024
    Authors
    Joakim Arvidsson
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Overview

    The RT-IoT2022, a proprietary dataset derived from a real-time IoT infrastructure, is introduced as a comprehensive resource integrating a diverse range of IoT devices and sophisticated network attack methodologies. This dataset encompasses both normal and adversarial network behaviours, providing a general representation of real-world scenarios. Incorporating data from IoT devices such as ThingSpeak-LED, Wipro-Bulb, and MQTT-Temp, as well as simulated attack scenarios involving Brute-Force SSH attacks, DDoS attacks using Hping and Slowloris, and Nmap patterns, RT-IoT2022 offers a detailed perspective on the complex nature of network traffic. The bidirectional attributes of network traffic are meticulously captured using the Zeek network monitoring tool and the Flowmeter plugin. Researchers can leverage the RT-IoT2022 dataset to advance the capabilities of Intrusion Detection Systems (IDS), fostering the development of robust and adaptive security solutions for real-time IoT networks.

    Introductory Paper Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset By B. S. Sharmila, Rohini Nagapadma. 2023 Published in Cybersecurity

    Variable Table available here: https://archive.ics.uci.edu/dataset/942/rt-iot2022

    Column Details: id.orig_p id.resp_p proto service flow_duration fwd_pkts_tot bwd_pkts_tot fwd_data_pkts_tot bwd_data_pkts_tot fwd_pkts_per_sec bwd_pkts_per_sec flow_pkts_per_sec down_up_ratio fwd_header_size_tot fwd_header_size_min fwd_header_size_max bwd_header_size_tot bwd_header_size_min bwd_header_size_max flow_FIN_flag_count flow_SYN_flag_count flow_RST_flag_count fwd_PSH_flag_count bwd_PSH_flag_count flow_ACK_flag_count fwd_URG_flag_count bwd_URG_flag_count flow_CWR_flag_count flow_ECE_flag_count fwd_pkts_payload.min fwd_pkts_payload.max fwd_pkts_payload.tot fwd_pkts_payload.avg fwd_pkts_payload.std bwd_pkts_payload.min bwd_pkts_payload.max bwd_pkts_payload.tot bwd_pkts_payload.avg bwd_pkts_payload.std flow_pkts_payload.min flow_pkts_payload.max flow_pkts_payload.tot flow_pkts_payload.avg flow_pkts_payload.std fwd_iat.min fwd_iat.max fwd_iat.tot fwd_iat.avg fwd_iat.std bwd_iat.min bwd_iat.max bwd_iat.tot bwd_iat.avg bwd_iat.std flow_iat.min flow_iat.max flow_iat.tot flow_iat.avg flow_iat.std payload_bytes_per_second fwd_subflow_pkts bwd_subflow_pkts fwd_subflow_bytes bwd_subflow_bytes fwd_bulk_bytes bwd_bulk_bytes fwd_bulk_packets bwd_bulk_packets fwd_bulk_rate bwd_bulk_rate active.min active.max active.tot active.avg active.std idle.min idle.max idle.tot idle.avg idle.std fwd_init_window_size bwd_init_window_size fwd_last_window_size Attack_type

    Class Labels

    The Dataset contains both Attack patterns and Normal Patterns. Attacks patterns Details: 1. DOS_SYN_Hping------------------------94659 2. ARP_poisioning--------------------------7750 3. NMAP_UDP_SCAN--------------------2590 4. NMAP_XMAS_TREE_SCAN--------2010 5. NMAP_OS_DETECTION-------------2000 6. NMAP_TCP_scan-----------------------1002 7. DDOS_Slowloris------------------------534 8. Metasploit_Brute_Force_SSH---------37 9. NMAP_FIN_SCAN---------------------28 Normal Patterns Details:

    1. MQTT -----------------------------------8108
    2. Thing_speak-----------------------------4146
    3. Wipro_bulb_Dataset-------------------253
  7. c

    Cyber Security market size was $154.80 Billion in 2022!

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Apr 2, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Cyber Security market size was $154.80 Billion in 2022! [Dataset]. https://www.cognitivemarketresearch.com/cyber-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Apr 2, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    As per Cognitive Market Research's latest published report, the Global Cyber Security market size was $154.80 Billion in 2022 and it is forecasted to reach $353.15 Billion by 2030. Cyber Security Industry's Compound Annual Growth Rate will be 10.8% from 2023 to 2030. Market Dynamics of Cyber Security Market:

    Increased target based cyber-attacks:

    Every year, cybercrime dramatically rises as attackers become more proficient and sophisticated. In target-based cyberattacks, hackers or attackers focus on a single organisation because they have a particular business interest. Putting the attack together could take months so they can figure out the best way to get their exploit into your systems (or users). Because it has been precisely designed to attack your systems, processes, or persons, at the office and often at home, a targeted attack is frequently more harmful than an untargeted one. In addition to having an impact on the organization's and business's finances, cybersecurity also makes businesses more vulnerable and uncertain.

    Cyberattacks can potentially harm a company's reputation, especially if private customer information is taken. The established customer trust may suffer as a result of cyberattacks. This breach of trust may be challenging to repair and may have long-term effects on the company. The activities of a company are also disrupted by these attacks, making it difficult or impossible to access vital systems or data. This might cause delays in manufacturing, disrupt customer service, and result in lost income. Businesses may occasionally have to stop operating completely until the attack is stopped, which will have a greater financial impact.

    Growing need for automated cybersecurity due to the increased use of IoT devices.

    Restraining Factor:

    Budget restrictions and a lack of specialists among SME's:

    Cybersecurity is crucial prat of any organization as it protects against unwanted access, theft, and damage to critical data and computer systems. Cyber-attacks are growing more prevalent in today's digital environment, and they could have very negative effects. Due to the complexity of technology, many organisations, especially SME's, cannot afford cybersecurity despite its necessity. Cybersecurity can be complicated and calls for knowledge in fields like software development, network security, and cryptography. The cost of acquiring and maintaining this expertise might be high. In addition, considering the consistently evolving cyber threats, the updating of cybersecurity measures is necessary. This requires ongoing investment in technology, personnel, and training. Therefore, budget restrictions coupled with expensive tools and software’s and a lack of specialists in SME's might affect the growth of the cyber security market.

    Current Trends on Cyber Security:

    Rising e-commerce platforms and online shopping:

    Rising disposable income coupled with high penetration of internet and smartphone expected to drive the e-commerce market and online shopping. Online shopping is incredibly convenient for consumers as they can shop from the comfort of their homes or on-the-go using their smartphones or tablets. This is especially true during the COVID-19 pandemic when physical stores are closed or people prefer to avoid crowded places. In addition, online retailers can offer lower prices compared to physical stores due to lower overhead costs. Moreover, E-commerce platforms are open 24/7, which allows customers to shop at any time that is convenient for them. With advances in technology, e-commerce platforms have improved their shipping and delivery options. Overall, rising e-commerce platforms and online shopping provides new opportunities to cyber security market.

    Impact of COVID-19 pandemic on Cyber Security Market:

    With the widespread shift to remote work and online services, there has been a surge in cyber-attacks, making cyber security more important in COVID-19 pandemic. Organizations are investing in cyber security solutions to safeguard their systems and data as a result of the rise in cyberattacks brought on by the epidemic. The need for cyber security goods and services has increased as a result. Budget restrictions, especially for SME's, have been brought on by the economic burden of the epidemic on many organisations. Cost-effective cyber security solutions are now receiving more attention as a result of this. The CO...

  8. All-time biggest online data breaches 2025

    • statista.com
    Updated Nov 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Nov 28, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  9. Cybersecurity Incidents in India (2020–2024)

    • kaggle.com
    zip
    Updated Apr 22, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Agile Yaswanth Sai Simha Reddy (2025). Cybersecurity Incidents in India (2020–2024) [Dataset]. https://www.kaggle.com/datasets/saisimha203/cybersecurity-cases-india
    Explore at:
    zip(11210 bytes)Available download formats
    Dataset updated
    Apr 22, 2025
    Authors
    Agile Yaswanth Sai Simha Reddy
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Area covered
    India
    Description

    The dataset "Cybersecurity Cases in India" is a comprehensive collection of real-world cybersecurity incidents reported across various cities in India. The dataset encapsulates the financial loss, incident types, and categories, providing a detailed overview of the cybercrime landscape in one of the world’s largest digital economies. With over 1000 records, it spans incidents from 2020 to 2024, covering various types of cybercrimes such as phishing, online fraud, malware attacks, ransomware, data breaches, DDoS attacks, identity theft, and more. Each record captures important attributes of the incidents, such as the year, date of occurrence, amount lost in INR, the type of incident, the city in which it occurred, and the category of the affected entity (e.g., financial, personal, corporate).

    The dataset is structured to enable analysis of the trends in cybercrime over time, the financial impact of various cyberattacks, and the geographic distribution of incidents across Indian cities. It serves as a critical resource for cybersecurity professionals, policymakers, law enforcement agencies, and academic researchers seeking to understand the challenges posed by cybercrime in India and to identify strategies to combat these challenges.

    1. Dataset Purpose and Scope

    The dataset’s primary purpose is to provide an extensive, granular view of the nature and scope of cybersecurity incidents in India. It enables the analysis of the frequency, severity, and financial impact of cybercrimes across different types of attacks, cities, and time periods. As cybercrimes continue to rise globally, including in India, this dataset serves as an important tool for understanding the evolving threats and risks in cyberspace. Cybersecurity experts and analysts can leverage this dataset to identify patterns and trends, while government and law enforcement agencies can use it to devise more targeted interventions and preventive measures.

    India, with its large and growing digital footprint, is a prime target for cybercriminals. The country's rapidly expanding internet user base, coupled with increasing digital adoption in various sectors like finance, healthcare, education, and e-commerce, makes it an attractive target for cyberattacks. This dataset allows stakeholders to understand how cybercrime evolves in response to these dynamics.

    The dataset is a rich resource for understanding the following:

    • Incident Frequency: How often different types of cybercrimes are reported in various Indian cities.
    • Financial Impact: The monetary losses associated with each type of cybercrime.
    • Geographic Distribution: The prevalence of specific types of cybercrimes in particular cities or states.
    • Trend Analysis: How cybercrime has evolved over the years in terms of volume and impact.

    2. Dataset Structure and Variables

    The dataset includes the following key variables, each contributing valuable information to the analysis:

    • Year: The year in which the cybercrime incident occurred. This variable helps track the growth or decline of cybercrime incidents over time.
    • Date: The specific date of the cybercrime incident. This allows for time-series analysis of the data.
    • Amount_Lost_INR: The financial loss associated with the cybercrime incident, expressed in Indian Rupees (INR). This variable highlights the economic impact of each cyberattack and can be used to assess the severity of different incidents.
    • Incident_Type: The type of cybercrime incident. This can include phishing, online fraud, malware attacks, ransomware, data breaches, DDoS attacks, and identity theft. This variable is crucial for understanding which types of cybercrimes are most prevalent and how they differ in their impact.
    • City: The city where the incident occurred. This allows for the geographic analysis of cybercrime, helping to identify high-risk areas and cities where certain types of cyberattacks are more common.
    • Category: The category of the entity affected by the cybercrime, such as financial institutions, government bodies, corporations, educational institutions, or individuals. This variable provides insights into which sectors are more vulnerable to specific types of cyberattacks.

    3. Cybersecurity Threat Landscape in India

    India's digital transformation has made it a prime target for cybercriminals. As of 2023, India is one of the largest internet markets in the world, with over 600 million active internet users. The rapid growth of e-commerce, digital banking, social media, and government services has created new opportunities for cybercriminals to exploit vulnerabilities in digital systems. According to a 2022 report by the Indian Computer Emergency Response Team (CERT-In), India witnessed a significant increase in cybersecurity incidents, with millions of cyberattacks targeting individuals, b...

  10. N

    Cyber Security Market Analysis Report | 2022 - 2030

    • nextmsc.com
    pdf,excel,csv,ppt
    Updated Nov 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Next Move Strategy Consulting (2025). Cyber Security Market Analysis Report | 2022 - 2030 [Dataset]. https://www.nextmsc.com/report/cyber-security-market
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Nov 30, 2025
    Dataset authored and provided by
    Next Move Strategy Consulting
    License

    https://www.nextmsc.com/privacy-policyhttps://www.nextmsc.com/privacy-policy

    Time period covered
    2021 - 2030
    Area covered
    Global
    Description

    Cyber Security Market size was valued at USD 197.4 billion in 2021, and is predicted to reach USD 657.02 billion by 2030, with a CAGR of 12.8% from 2022 to 2030.

  11. Potential concerning effects of cyber attacks worldwide 2022

    • statista.com
    Updated Aug 15, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2022). Potential concerning effects of cyber attacks worldwide 2022 [Dataset]. https://www.statista.com/statistics/1331647/concerning-effects-cyber-attacks-worldwide/
    Explore at:
    Dataset updated
    Aug 15, 2022
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2022
    Area covered
    Worldwide
    Description

    In 2022, sensitive data exposure tops the list of the cyberattack effects that worry people the most, according to ** percent of respondents. Due to the ramifications for users and those who depend on those services, downtime for important services ranked second, with **** percent of respondents concerned by it.

  12. 🌐 Global Cybersecurity Threats (2015-2024)

    • kaggle.com
    zip
    Updated Mar 16, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Atharva Soundankar (2025). 🌐 Global Cybersecurity Threats (2015-2024) [Dataset]. https://www.kaggle.com/datasets/atharvasoundankar/global-cybersecurity-threats-2015-2024
    Explore at:
    zip(48178 bytes)Available download formats
    Dataset updated
    Mar 16, 2025
    Authors
    Atharva Soundankar
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    📂

    The Global Cybersecurity Threats Dataset (2015-2024) provides extensive data on cyberattacks, malware types, targeted industries, and affected countries. It is designed for threat intelligence analysis, cybersecurity trend forecasting, and machine learning model development to enhance global digital security.

    📊 Column Descriptions

    Column NameDescription
    CountryCountry where the attack occurred
    YearYear of the incident
    Threat TypeType of cybersecurity threat (e.g., Malware, DDoS)
    Attack VectorMethod of attack (e.g., Phishing, SQL Injection)
    Affected IndustryIndustry targeted (e.g., Finance, Healthcare)
    Data Breached (GB)Volume of data compromised
    Financial Impact ($M)Estimated financial loss in millions
    Severity LevelLow, Medium, High, Critical
    Response Time (Hours)Time taken to mitigate the attack
    Mitigation StrategyCountermeasures taken
  13. Multi-Step Cyber-Attack Dataset (MSCAD)

    • kaggle.com
    Updated Jun 19, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dr. Jamail Al-Sawwa (2022). Multi-Step Cyber-Attack Dataset (MSCAD) [Dataset]. http://doi.org/10.34740/kaggle/dsv/3830715
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jun 19, 2022
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Dr. Jamail Al-Sawwa
    Description

    There are seven files in this dataset: MSCAD.xlsx, N-0, Scan-1, App-01, App-02, W-B-01, W-B-02:

    • MSCAD.xlsx: MSCAD.xlsx presents the labeled version of the dataset. The six PCAP files were processed using Wireshark. Throughout the processing, we analyzed the timestamp of the network traffic (malicious and normal traffic) in order to label the network traffic. After processing these PCAP files, the generated dataset (MSCAD) contains 77 features (network parameters) with labels.

    • N-0: N-0 presents (Normal traffic).

    • Scan-1: Scan-1 presents (Port Scan Traffic [Full, SYN, FIN, and UDP Scan]).

    • App-01: App-01 presents (App-based DDoS [HTTP Slowloris DDoS]).

    • App-02: App-02 presents (Volume-based DDoS [ICMP Flood]).

    • W-B-01: W-B-01 presents (Web Crawling).

    • W-B-02: W-B-02 presents (Password Cracking [Brute Force]).

      The MSCAD includes two multi-step cyber-attacks scenarios. The two multi-step attack scenarios were performed as follows:

    • Multi-step Attack Scenario A: In this scenario, an attacker aims to perform a password cracking attack (Brute force) on any host within the victim network. The attacker executes this attack in three main sequential steps. Firstly, the port scan was executed simultaneously. Secondly, the HTTrack Website Copier was used as a website crawler tool to take an offline copy of the web application pages. Using a password list of 47 entries and a user list of 10 entries resulted in 470 attempts to crack the password. Finally, the Brute force script was executed.

    • Multi-step Attack Scenario B: In scenario B, the attacker aims to execute the volume-based DDoS on any host within the victim network. The volume-based DDoS was performed based on three sequential steps. The first step of the volume-based DDoS attack is to execute the port scan attack (Full, SYN, FIN, and UDP Scan) simultaneously. Then, the next step is to launch the APP-based DDoS attack using HTTP Slowloris DDoS attack. Finally, executing the volume-based DDoS attack using the Radware tool. This scenario took an hour and three hosts 192.168.159.131, 192.168.159.14, and 192.168.159.16) were infected by the volume-based DDoS attack.

    The MSCAD dataset is publicly available for researchers. If you are using our dataset, you should cite our related research paper that outlines the details of the dataset and its underlying principles:

    **Link to Paper: **Generating a Benchmark Cyber Multi-Step Attacks Dataset for Intrusion Detection

    **Citation: ** 1) Almseidin, Mohammad, Al-Sawwa, Jamil, and Alkasassbeh, Mouhammd. ‘Generating a Benchmark Cyber Multi-step Attacks Dataset for Intrusion Detection’. 1 Jan. 2022 : 1 – 15.

    2) Dr. Jamil Al-Sawwa, Dr. Mohammad Almseidin, & Dr. Mouhammd Alkasassbeh. (2022). Multi-Step Cyber-Attack Dataset (MSCAD) [Data set]. Kaggle. https://doi.org/10.34740/KAGGLE/DSV/3830715

  14. c

    Cybersecurity market size was USD 173.78 Billion in 2022!

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research, Cybersecurity market size was USD 173.78 Billion in 2022! [Dataset]. https://www.cognitivemarketresearch.com/cybersecurity-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research the global cyber security market size was USD XX Million in 2024 and is set to achieve the market size of USD XX Million by the end of 2033 Growing at A CAGR of XX% from 2025-2033.

    According to Cognitive Market Research Asia Pacific region cyber security market is experiencing significant growth driven by increasing digitalization and evolving cyber threats .it is projected to reach a substantial size by 2030. it is expected to generate revenue of XX%.

    According to Cognitive Market Research North America is leading the cyber security market and is projected to grow at a CAGR of XX% over the period . 
    
    Europe is expected to generate revenue of XX%.
    Latin america expected to generate revenue of XX%.
    Middle East and Africa expected to generate revenue of XX%.
    South America expected to generate revenue of XX%.
    

    Market Dynamics of

    Cybersecurity Market

    Key Drivers for Cybersecurity Market

    Increasing Frequency and Complexity of Cyber Threats: The rising incidence of cyberattacks—including ransomware, phishing, and advanced persistent threats (APTs)—is driving organizations to make significant investments in cybersecurity. With critical data breaches impacting healthcare, finance, and government sectors, companies are prioritizing proactive threat detection, incident response, and threat intelligence solutions. This growing risk landscape is one of the primary factors motivating global cybersecurity expenditures. Extensive Digital Transformation and Cloud Adoption: The increase in digital operations, cloud migration, and remote work arrangements has expanded the attack surface for organizations. Cloud-native applications and hybrid environments necessitate strong cybersecurity frameworks, including identity access management (IAM), cloud security posture management (CSPM), and zero-trust models. This transformation is fueling the demand for scalable and integrated security solutions across various industries. Strict Data Privacy Regulations and Compliance Obligations: Governments and regulatory agencies around the world are implementing more stringent data protection laws such as GDPR (Europe), CCPA (California), and HIPAA (USA). These regulations mandate that businesses maintain data confidentiality, integrity, and availability. Failure to comply can lead to substantial penalties and damage to reputation, prompting organizations to implement comprehensive cybersecurity solutions and perform regular audits.

    Key Drivers for Cybersecurity Market

    High Expenses Associated with Deployment and Maintenance: Establishing enterprise-level cybersecurity frameworks—such as advanced firewalls, Security Information and Event Management (SIEM), and endpoint detection—demands a considerable financial outlay. Furthermore, the continuous expenses related to upkeep, software updates, and the need for skilled personnel render cybersecurity solutions a financial burden, particularly for small and medium-sized enterprises (SMEs) and startups, which may hinder their ability to penetrate the market. Deficiency of Qualified Cybersecurity Experts: The global shortage of talent in the cybersecurity field is increasingly pronounced, with the demand significantly exceeding the available supply. Organizations face challenges in sourcing qualified professionals for positions such as security analysts, ethical hackers, and Chief Information Security Officers (CISOs). This lack of skilled personnel can postpone cybersecurity initiatives, prolong response times to threats, and ultimately expose systems to vulnerabilities, despite substantial investments in security tools. Challenges of Integrating with Legacy Systems: Numerous enterprises maintain legacy IT systems that do not align with contemporary cybersecurity solutions. The process of incorporating new security measures into these outdated infrastructures can result in operational interruptions, performance delays, and security vulnerabilities. Such complexities frequently lead to postponed implementation or diminished effectiveness of cybersecurity strategies.

    Key Drivers for Cybersecurity Market

    Adoption of AI and Machine Learning in Threat Detection: Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing the field of cybersecurity by facilitating real-time threat detection, behavioral analytics, and automated responses. These advanced technologies...

  15. B

    Big Data Security Intelligence Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Big Data Security Intelligence Market Report [Dataset]. https://www.marketreportanalytics.com/reports/big-data-security-intelligence-market-90666
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Apr 23, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Big Data Security Intelligence market is booming, projected to reach [estimated market size] by 2033 with a 17.95% CAGR. Learn about key drivers, trends, restraints, leading companies (Oracle, IBM, Microsoft, AWS), and regional insights in this comprehensive market analysis. Discover how AI and cloud solutions are shaping the future of data security. Recent developments include: May 2022: Oracle has increased the built-in security capabilities and services of Oracle Cloud Infrastructure (OCI) to assist clients in protecting their cloud apps and data from potential threats. A new integrated and cloud-native firewall service, improvements to Oracle Cloud Guard and Oracle Security Zones, and five more features complete OCI's already extensive security offering. These advancements will help enterprises protect their cloud installations and apps even more simply by providing easy, prescriptive, and integrated services that, in most circumstances, do not require extra expenditure., July 2022: IBM announced a contract with the Defense Microelectronics Activity (DMEA) to provide security services designed to help DMEA in the supply chain of secured and trusted semiconductors for military and national security programs for critical mission platforms., October 2022: IBM enhanced data resilience and sustainability with IBM Diamondback Tape Library, a portfolio of data resilience solutions, a high-density archival storage solution to help minimize space requirements for data centers, and organizations' carbon footprint to protect ransomware and other cyber threats in hybrid cloud environments.. Key drivers for this market are: Increasing Variety And Volume of Business Data Generated from Various Sources, Increasing Cyber-Attacks Demand for Scalable High Security Solutions; Growth of E-Commerce Industry. Potential restraints include: Increasing Variety And Volume of Business Data Generated from Various Sources, Increasing Cyber-Attacks Demand for Scalable High Security Solutions; Growth of E-Commerce Industry. Notable trends are: High Demands for Data Security in Manufacturing Sector to Drive the Market Growth.

  16. c

    cyber threat intelligence services market was estimated to be worth USD 11.1...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research, cyber threat intelligence services market was estimated to be worth USD 11.1 billion in 2022! [Dataset]. https://www.cognitivemarketresearch.com/cyber-threat-intelligence-services-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the worldwide cyber threat intelligence services market was estimated at USD 11.1 billion in 2022 and rise at a compound annual growth rate (CAGR) of 19.10% from 2023 to 2030. Emerging Digital Technologies Increased Cyber Attacks Drive Market Growth

    Cybercrime has been on the rise for several years and shows no signs of abating. The epidemic has increased the number of people working from home, which has increased the number of cyberattacks. Organizations are embracing a work-from-home strategy, which raises questions regarding corporate security.

    Every 10 seconds, a new organization falls victim to ransomware. Harris Federation, Channel Nine, Florida Water System, CAN Financial, Bombardier, Acer, Microsoft Exchange, and Sierra Wireless were among the companies targeted by major cyberattacks in 2021.

    (Source:securityboulevard.com/2021/12/10-major-cyber-attacks-witnessed-globally-in-q1-2021/)

    Furthermore, the introduction of cloud computing and cybersecurity has shifted the focus from single networks to dispersed networks. Threat intelligence solutions give information about attacks as they happen. As a result, the increased usage of threat intelligence programs by enterprises to monitor global cyberattacks and threat data is likely to drive market expansion.

    According to Tanium's endpoint security research, 75% of enterprises employ threat intelligence on a regular and continuous basis. As a result, increased cyberattacks contribute to worldwide market growth.

    (Source:venturebeat.com/security/why-getting-endpoint-security-right-is-crucial/)

    Increasing Regulatory Compliance Obligations Accelerates Market Growth
    

    Increasing regulatory compliance requirements in a variety of industries are boosting demand for threat intelligence solutions. Governments and regulatory authorities are requiring businesses to develop sophisticated cybersecurity safeguards to secure sensitive data and ensure customer privacy. Noncompliance with these regulations can result in hefty financial penalties as well as reputational harm.

    Regulations such as the United States' California Consumer Privacy Act (CCPA), Europe's General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS) globally emphasize the importance of organizations having a comprehensive understanding of the threat landscape and implementing proactive security measures. Threat intelligence assists firms in meeting these compliance obligations by offering insights into new threats, vulnerabilities, and risk mitigation best practices.

    Microsoft announced the introduction of threat intelligence capabilities into its Azure cloud platform on March 15, 2023, to assist enterprises in meeting regulatory compliance obligations. The connection enables enterprises to take use of real-time threat intelligence feeds, allowing them to quickly identify and respond to potential security concerns. Microsoft intends to help enterprises effectively comply with regulatory regulations by embedding threat intelligence directly into its cloud services.

    (Source:www.microsoft.com/en-us/security/blog/2023/01/23/microsoft-security-innovations-from-2022-to-help-you-create-a-safer-world-today/)

    The Factors are Impeding The Growth of the Market for Cyber Threat Intelligence Services

    Lack of Skilled And Well-Trained Security Analysts is Limiting Market Growth
    

    The most significant barrier to securing industry infrastructure is a scarcity of security personnel.According to Janet Manfra, deputy director of CISA, skill shortages in the public and commercial sectors could pose national security vulnerabilities. Countries such as Japan and the United Kingdom struggle to locate skilled cybersecurity specialists.Despite the ever-expanding digital marketplace, there is a growing scarcity of security specialists overseeing vital infrastructure. As a result, qualified and skilled security experts are needed to efficiently operate threat intelligence products.

    Impact of COVID - 19 on the Cyber Threat Intelligence Services Market

    The COVID-19 pandemic has had a good impact on the industry, with government agencies around the world implementing new ways to address the organizations' cyber issues. Many organizations are going through response, rehabilitation, and renewal stages as a result of COVID-19. An organization may weather the COVID-19 crisis an...

  17. Share of cyberattacks in global industries worldwide 2024

    • statista.com
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of cyberattacks in global industries worldwide 2024 [Dataset]. https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    Worldwide
    Description

    In 2024, manufacturing saw the highest share of cyberattacks among the leading industries worldwide. During the examined year, manufacturing companies encountered more than a quarter of the total cyberattacks. Organizations in the finance and insurance followed, with around 23 percent. Professional, business, and consumer services ranked third, with 18 percent of reported cyberattacks. Manufacturing industry and cyberattacks The industry of manufacturing has been in the center of cyberattacks in a long time. The share of cyberattacks targeting organizations in this sector in 2018 was at 10 percent, while in 2024, it amounted to 26 percent. The situation is even more compliacted when we look at the cyber vulnerabilities found in this sector. In 2024, critical vulnerabilities in manufacturing companies lasted 205 days on average. IT perspective and prevention With recent technology developments, cybersecurity is crucial to an organization’s success. Realizing this, companies have been gradually increasing cybersecurity investments. Thus, in 2024, the cybersecurity budget worldwide was forecast to increase to nearly 283 billion U.S. dollars. Roughly nine in ten board directors of companies worldwide in professional services and media and entertainment industries say they expect an increase in the cybersecurity budget.

  18. I

    India Cyber Security Incidents: Total

    • ceicdata.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    CEICdata.com, India Cyber Security Incidents: Total [Dataset]. https://www.ceicdata.com/en/india/information-technology-statistics-cyber-security-incidents/cyber-security-incidents-total
    Explore at:
    Dataset provided by
    CEICdata.com
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Time period covered
    Dec 1, 2012 - Dec 1, 2023
    Area covered
    India
    Variables measured
    Technology
    Description

    India Cyber Security Incidents: Total data was reported at 1,592,917.000 Unit in 2023. This records an increase from the previous number of 1,391,457.000 Unit for 2022. India Cyber Security Incidents: Total data is updated yearly, averaging 49,908.500 Unit from Dec 2004 (Median) to 2023, with 20 observations. The data reached an all-time high of 1,592,917.000 Unit in 2023 and a record low of 23.000 Unit in 2004. India Cyber Security Incidents: Total data remains active status in CEIC and is reported by Indian Computer Emergency Response Team. The data is categorized under India Premium Database’s Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents.

  19. I

    Incident Response Services Market Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Incident Response Services Market Report [Dataset]. https://www.marketreportanalytics.com/reports/incident-response-services-market-88729
    Explore at:
    ppt, doc, pdfAvailable download formats
    Dataset updated
    Apr 30, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Incident Response Services market is experiencing robust growth, driven by the increasing frequency and sophistication of cyberattacks targeting businesses across all sectors. The market's Compound Annual Growth Rate (CAGR) of 20.83% from 2019 to 2024 suggests a significant expansion, projected to continue into the forecast period (2025-2033). This growth is fueled by several factors, including the rising adoption of cloud technologies (increasing attack surface), the expanding digital footprint of organizations, and increasingly stringent data privacy regulations necessitating proactive security measures. The need for rapid and effective incident response to minimize downtime, data breaches, and reputational damage is driving demand for specialized services from established players and emerging niche providers. Large enterprises are currently the largest segment, but smaller and medium-sized enterprises (SMEs) are showing accelerated growth as they become increasingly aware of their cybersecurity vulnerabilities. The BFSI (Banking, Financial Services, and Insurance) and IT & Telecom sectors are key end-user industries, but growth is also visible in healthcare, government, and transportation due to the increasing digitalization in these sectors. The competitive landscape is characterized by a mix of global cybersecurity giants, specialized incident response firms, and consulting companies offering cybersecurity services. Geographical distribution shows North America currently holding a substantial market share, but Asia-Pacific is expected to witness significant growth owing to rapid digital transformation and increasing internet penetration in developing economies. While North America maintains a dominant position due to early adoption and established security infrastructure, the Asia-Pacific region is poised for substantial growth, fueled by increasing digitalization and government initiatives promoting cybersecurity. The market segmentation by enterprise size reveals a substantial contribution from large enterprises, which are often targets of sophisticated attacks. However, the SME segment is experiencing the fastest growth rate, reflecting a growing awareness of cyber threats and a greater need for affordable, accessible incident response services. The presence of both large multinational corporations and specialized firms ensures a varied range of service offerings catering to the diverse needs of different clients. The forecast for 2033 suggests a significant market expansion, driven by ongoing digital transformation and evolving cyber threats, underscoring the enduring importance of proactive and reactive incident response capabilities. Continued innovation in areas such as AI-driven threat detection and automation will further shape market dynamics. Recent developments include: October 2022: BlackBerry launched Cyber Threat Intelligence (CTI), a professional threat intelligence service that will provide actionable intelligence on targeted attacks and cybercrime-motivated threat actors and campaigns, as well as intelligence reports specific to industries, regions, and countries, to help customers prevent, detect, and effectively respond to cyberattacks., October 2022: Check Point Software launched Check Point Quantum Titan, which leverages artificial intelligence (AI) and deep learning to deliver advanced threat prevention against advanced domain name system exploits (DNS) and phishing as autonomous IoT across the network, data center, cloud, and endpoints.. Key drivers for this market are: Increasing Number of Security Breaches in BFSI sector to drive the market, Increasing Compliance Requirements by Enterprises is expected to flourish the market. Potential restraints include: Increasing Number of Security Breaches in BFSI sector to drive the market, Increasing Compliance Requirements by Enterprises is expected to flourish the market. Notable trends are: BFSI Sector to Drive the Market Growth.

  20. RT-IoT2022(Real Time Internet Of Things)

    • kaggle.com
    zip
    Updated Jan 8, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    supplejade (2024). RT-IoT2022(Real Time Internet Of Things) [Dataset]. https://www.kaggle.com/datasets/supplejade/rt-iot2022real-time-internet-of-things/code
    Explore at:
    zip(3820965 bytes)Available download formats
    Dataset updated
    Jan 8, 2024
    Authors
    supplejade
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description
    • The RT-IoT2022, a proprietary dataset encompasses both normal and adversarial network behaviors, providing a general representation of real-world scenarios.
    • Incorporating data from IoT devices such as ThingSpeak-LED, Wipro-Bulb, and MQTT-Temp, as well as simulated attack scenarios involving Brute-Force SSH attacks, DDoS attacks using Hping and Slowloris, and Nmap patterns, RT-IoT2022 offers a detailed perspective on the complex nature of network traffic. The bidirectional attributes of network traffic are meticulously captured using the Zeek network monitoring tool and the Flowmeter plugin.
    • Infrastructure consists of two parts, namely IoT victim devices and IoT attacker devices, both connected through a router. We collect the network traffic through a router using Wireshark, which is an open-source monitoring tool for network traffic that helps extract traces and convert them into a PCAP file.
    • The attacking infrastructure includes 50 machines, and the victim organization has 5 departments and includes 420 machines and 30 servers. The dataset includes the captures network traffic and system logs of each machine, along with 80 features extracted from the captured traffic.

    • It includes 9 different attack scenarios: DOS_SYN_Hping,, ARP_poisioning, NMAP_UDP_SCAN, NMAP_XMAS_TREE_SCAN, NMAP_OS_DETECTION, NMAP_TCP_scan, DDOS_Slowloris, Metasploit_Brute_Force_SSH, NMAP_FIN_SCAN and 3 normal pattern MQTT, Thing_speak and Wipro_bulb_Dataset.

    • Dataset is downloaded from site: https://archive.ics.uci.edu/dataset/942/rt-iot2022

    • Paper with details of the dataset: https://cybersecurity.springeropen.com/articles/10.1186/s42400-023-00178-5#Tab4

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Incidents of cyber attacks in India 2015-2022 [Dataset]. https://www.statista.com/statistics/1201177/india-number-of-cyber-attacks/
Organization logo

Incidents of cyber attacks in India 2015-2022

Explore at:
Dataset updated
Nov 28, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
India
Description

More than *** million cyberattacks were reported across India in 2022. This was a significant increase compared to 2019. The country was among the top **** with the most number of cybersecurity incidents that year. Furthermore, India ranked ***** in terms of internet user numbers.

Search
Clear search
Close search
Google apps
Main menu