100+ datasets found
  1. DDoS attacks number global Q1 2023-Q2 2025

    • statista.com
    Updated Feb 19, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2026). DDoS attacks number global Q1 2023-Q2 2025 [Dataset]. https://www.statista.com/statistics/1557643/ddos-attacks-global-number/
    Explore at:
    Dataset updated
    Feb 19, 2026
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    In the second quarter of 2025, around ******* DDoS attacks were registered worldwide. The figure has been increasing continuously over the observed period.

  2. YoY growth in DDoS attacks global 2022-2023, by region

    • statista.com
    Updated Feb 2, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2026). YoY growth in DDoS attacks global 2022-2023, by region [Dataset]. https://www.statista.com/statistics/1537964/yoy-change-ddos-attacks-global-by-region/
    Explore at:
    Dataset updated
    Feb 2, 2026
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    Between 2022 and 2023, organizations in the APAC region saw a *** percent growth in the number of distributed denial of service (DDoS) attacks. The average global growth of these attacks was ** percent. Furthermore, the Americas saw *** percent growth, while the EMEA region ranked third, with only ** percent growth in the measured period.

  3. m

    CIC-DDoS2019 Dataset

    • data.mendeley.com
    • kaggle.com
    Updated Mar 3, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Md Alamin Talukder (2023). CIC-DDoS2019 Dataset [Dataset]. http://doi.org/10.17632/ssnc74xm6r.1
    Explore at:
    Dataset updated
    Mar 3, 2023
    Authors
    Md Alamin Talukder
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Distributed Denial of Service (DDoS) attack is a menace to network security that aims at exhausting the target networks with malicious traffic. Although many statistical methods have been designed for DDoS attack detection, designing a real-time detector with low computational overhead is still one of the main concerns. On the other hand, the evaluation of new detection algorithms and techniques heavily relies on the existence of well-designed datasets. In this paper, first, we review the existing datasets comprehensively and propose a new taxonomy for DDoS attacks. Secondly, we generate a new dataset, namely CICDDoS2019, which remedies all current shortcomings. Thirdly, using the generated dataset, we propose a new detection and family classification approach based on a set of network flow features. Finally, we provide the most important feature sets to detect different types of DDoS attacks with their corresponding weights.

    The dataset offers an extended set of Distributed Denial of Service attacks, most of which employ some form of amplification through reflection. The dataset shares its feature set with the other CIC NIDS datasets, IDS2017, IDS2018 and DoS2017

    original paper link: https://ieeexplore.ieee.org/abstract/document/8888419 kaggle dataset link: https://www.kaggle.com/datasets/dhoogla/cicddos2019

  4. Real-Time DDoS Traffic Dataset for ML

    • kaggle.com
    zip
    Updated Nov 1, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    kalireadhat (2024). Real-Time DDoS Traffic Dataset for ML [Dataset]. https://www.kaggle.com/datasets/kalireadhat/realtime-ddos-traffic-dataset
    Explore at:
    zip(32098 bytes)Available download formats
    Dataset updated
    Nov 1, 2024
    Authors
    kalireadhat
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    The Real-Time DDoS Traffic Dataset for ML is designed to support the development, testing, and validation of machine learning models focused on detecting Distributed Denial of Service (DDoS) attacks in real-time. As cybersecurity threats evolve, particularly in the realm of network traffic anomalies like DDoS, having access to labeled data that mirrors real-world attack scenarios is essential. This dataset aims to bridge this gap by providing comprehensive, structured network traffic data that includes both normal and DDoS attack instances, facilitating machine learning research and experimentation in DDoS detection and prevention.

    The dataset is compiled from network traffic that either replicates real-time conditions or is simulated under carefully controlled network configurations to generate authentic DDoS attack traffic. This data encompasses variations in packet transmission and byte flow, which are key indicators in distinguishing between typical network behavior and DDoS attack patterns. The primary motivation behind this dataset is to aid machine learning practitioners and cybersecurity experts in training models that can effectively differentiate between benign and malicious traffic, even under high-stress network conditions.

    Data Source and Collection: Include information on how the data was collected, whether it was simulated or recorded from real systems, and any specific tools or configurations used.

    Dataset Structure: List and explain the features or columns in the dataset. For instance, you might describe columns such as:

    • traffic_type: Indicates whether the traffic is normal or DDoS.
    • packet_count: The number of packets in a session.
    • packet_count_per_second: The rate of packets over time.
    • byte_count: Total data in bytes for a session.
    • byte_count_per_second: The data transfer rate over time.

    This dataset is ideal for a range of applications in cybersecurity and machine learning:

    1.Training DDoS Detection Models: The dataset is specifically structured for use in supervised learning models that aim to identify DDoS attacks in real time. Researchers and developers can train and test models using the labeled data provided.

    2.Real-Time Anomaly Detection: Beyond DDoS detection, the dataset can serve as a foundation for models focused on broader anomaly detection tasks in network traffic monitoring.

    3.Benchmarking and Comparative Studies: By providing data for both normal and attack traffic, this dataset is suitable for benchmarking various algorithms, allowing comparisons across different detection methods and approaches.

    4.Cybersecurity Education: The dataset can also be used in educational contexts, allowing students and professionals to gain hands-on experience with real-world data, fostering deeper understanding of network anomalies and cybersecurity threats.

    Limitations and Considerations While the dataset provides realistic DDoS patterns, it is essential to note a few limitations:

    Data Origin: The dataset may contain simulated attack patterns, which could differ from real-world DDoS attack traffic in more complex network environments.

    Sampling Bias: Certain features or types of attacks may be overrepresented due to the specific network setup used during data collection. Users should consider this when generalizing their models to other environments.

    Ethical Considerations: This dataset is intended for educational and research purposes only and should be used responsibly to enhance network security.

    Acknowledgments This dataset is an open-source contribution to the cybersecurity and machine learning communities, and it is designed to empower researchers, educators, and industry professionals in developing stronger defenses against DDoS attacks.

  5. m

    AdDDoSDN: Adversarial DDoS Attacks Dataset for Software-Defined Networks

    • data.mendeley.com
    Updated Sep 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Mohd Adil Bin Mokti (2025). AdDDoSDN: Adversarial DDoS Attacks Dataset for Software-Defined Networks [Dataset]. http://doi.org/10.17632/9jp6r68y98.1
    Explore at:
    Dataset updated
    Sep 19, 2025
    Authors
    Mohd Adil Bin Mokti
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    The AdDDoSDN dataset is a comprehensive network traffic corpus built for defensive SDN research, capturing coordinated DDoS attacks and benign enterprise activity through controlled Mininet experiments driven by a remote Ryu L3 controller to deliver high-quality labeled data for real-time detection development. The environment emulates a segmented four-subnet enterprise: h1 (192.168.10.10/24) acts as the external attacker, h2–h5 (192.168.20.10–13/24) form the corporate client subnet with h2 handling ICMP exchanges and h3/h5 generating rich TCP and UDP application sessions, h6 (192.168.30.10/24) resides in the server/DMZ subnet as the primary victim, and controller services operate on 192.168.0.0/24, providing realistic inter-subnet attack paths while preserving centralized SDN visibility.

    The dataset follows a structured, configurable timeline sourced from config.json, with the default cycle spanning roughly 35 minutes per run: a 5-second initialization period, 1,600 seconds of benign traffic mixing ICMP, Telnet, SSH, FTP, HTTP/S, and DNS exchanges, enhanced traditional attacks from h1 including an 88-second SYN flood and 176-second UDP flood against h6, plus an 88-second ICMP flood toward h4, and adversarial attacks from h1 to h6 comprising a 72-second TCP state-exhaustion phase with human-like timing patterns, a 24-second application-layer mimicry burst combining heavy HTTP range/post requests with legitimate queries, and a 72-second slow-read phase sustaining long-lived connections. Traditional phases operate around 20–30 packets per second with protocol-compliant options, while adversarial scripts emphasize mimicry and timing jitter.

    The dataset provides three synchronized data products derived from each capture cycle: 1. Packet-level data (adddosdn_packet_dataset.csvv): 30 header fields + 2 labels extracted directly from PCAP phases. 2. SDN flow-level data (adddosdn_flow_dataset.csv): Controller statistics with derived rates and labels collected via the Ryu REST API. 3. CICFlow aggregated data (adddosdn_cicflow_dataset.csv): 85 bidirectional behavioral features generated with CICFlowMeter.

    The dataset demonstrates exceptional quality containing 3.5 million total records across dataset instances, each representing different temporal scenarios. Labels span normal, syn_flood, udp_flood, icmp_flood, ad_syn, ad_udp, and ad_slow, with Label_binary collapsing them into benign (0) versus malicious (1) classes to maintain consistency across packet, controller-flow, and behavioral representations.

  6. m

    TSD-DDoS: A Time-Series Dataset for TCP Flooding Attack Detection and...

    • data.mendeley.com
    Updated Feb 15, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ratan Kumar Sajja (2026). TSD-DDoS: A Time-Series Dataset for TCP Flooding Attack Detection and Severity Assessment for Server Health Monitoring [Dataset]. http://doi.org/10.17632/gyggjxs36z.2
    Explore at:
    Dataset updated
    Feb 15, 2026
    Authors
    Ratan Kumar Sajja
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Distributed Denial of Service (DDoS) attacks aim to disrupt networked services by overwhelming server resources, thereby preventing legitimate users from accessing critical applications. Among various attack vectors, TCP-based flooding attacks remain particularly impactful due to the widespread use of the Transmission Control Protocol in reliable Internet services such as web applications, cloud back-end systems, databases, and enterprise platforms.

    This dataset presents a time-series representation of TCP flooding attack traffic, derived from the widely used benchmark dataset CICDDoS2019. Unlike the original CICDDoS2019 flow-based CSV files, which describe traffic characteristics at the individual TCP flow level, the proposed dataset aggregates network traffic over fixed 5-second time windows, enabling temporal analysis of server load and attack progression.

    The dataset was generated by replaying selected CICDDoS2019 packet capture (pcap) files using tcpreplay at varying network speeds of up to 20 Gbps. Network traffic was captured using Wireshark, segmented into consecutive 5-second intervals, and processed to extract time-dependent TCP packet statistics for each interval. This processing strategy enables direct observation of how TCP flooding attacks evolve over time and how they affect server-side traffic intensity.

    The resulting dataset focuses on TCP-based flooding behaviors, including TCP-SYN, TCP-SYN-ACK, TCP-ACK, and TCP-RST packet activity. Each time window is represented by a compact set of aggregated features that quantify TCP control packet counts and overall TCP traffic volume. The structured, labeled, and time-indexed nature of the data makes the dataset particularly suitable for the development and evaluation of machine learning–based intrusion detection systems (IDS), including both attack detection and severity assessment models.

    The dataset consists of six CSV files. Two primary files represent time-series traffic captured on 12 January and 11 March, corresponding to the training and testing days defined in CICDDoS2019. These files include the following attributes: pcap file identifier, time window index, counts of SYN, SYN-ACK, ACK, and RST packets, and the total number of TCP packets per interval. Additional CSV files are derived from these base datasets and provide labeled samples for TCP-SYN flooding attack detection and attack severity classification.

    By providing time-window–based TCP traffic characteristics, this dataset supports research on machine learning–driven intrusion detection, server health monitoring, and adaptive resource management in cloud and virtualized environments, where scaling and mitigation decisions depend on the temporal behavior of incoming traffic rather than individual flow statistics.

  7. Dos/DDoS Attacks on 5g networks

    • kaggle.com
    zip
    Updated Sep 27, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Iagobs (2024). Dos/DDoS Attacks on 5g networks [Dataset]. https://www.kaggle.com/datasets/iagobs/dosddos-attacks-on-5g-networks
    Explore at:
    zip(177725589 bytes)Available download formats
    Dataset updated
    Sep 27, 2024
    Authors
    Iagobs
    License

    Apache License, v2.0https://www.apache.org/licenses/LICENSE-2.0
    License information was derived automatically

    Description

    Description

    This dataset is based on the paper "DoS/DDoS Attack Dataset of 5G Network Slicing" [1] and has been generated for the detection of attacks in 5G network slices. This dataset was developed by Khan et al. and it´s plublicly avaliable in IEEE: https://ieee-dataport.org/documents/dosddos-attack-dataset-5g-network-slicing#files.

    Data Origin - These data have been collected from a simulated 5G network testbed with slicing, including benign traffic and DoS/DDoS attacks. - Structure: - Benign Traffic and Malicious Traffic - Subdivided into Slice1 and Slice2 - Each slice contains data from Day1 and Day2 - The data initially contain 84 variables.

    Selected Features The following columns were selected from the dataset based on the authors' recommendation on page 641: - 'Flow Duration' - 'Src IP' - 'Dst Port' - 'Fwd Packet Length Std' - 'Src Port' - 'ACK Flag Count' - 'Protocol' - 'Total Fwd Packet' - 'Fwd Seg Size Min'

    Data Loading and Merging - Data from different slices and days, including attack and benign traffic, were loaded. - Attack and benign data were concatenated into a single DataFrame.

    Data Cleaning and Transformation - The '.pcap' extension was removed from the 'Attack' column. - Specific attack names were corrected (e.g., 'upf1_tcp' to 'tcp_fin'). - IP addresses were converted to numeric format. - Label encoding (LabelEncoder) was applied to the 'Attack' and 'Slice' columns.

    Handling Missing Values - Rows with NaN values were removed.

    Normalization - StandardScaler was applied to all numerical features for normalization.

    Final Preparation - A binary version of the label was created (0 for benign traffic, 1 for any type of attack).

    The final dataset used for the experiments contains 6,171,315 rows and 13 columns.

    [1] Md Sajid Khan, Behnam Farzaneh, Nashid Shahriar, and Md Mahibul Hasan (2023). The dataset is available on IEEE Dataport: https://dx.doi.org/10.21227/32k1-dr12.

  8. DDoS Botnet Attack on IOT Devices

    • kaggle.com
    zip
    Updated Jun 3, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SIDDHARTH M (2020). DDoS Botnet Attack on IOT Devices [Dataset]. https://www.kaggle.com/datasets/siddharthm1698/ddos-botnet-attack-on-iot-devices
    Explore at:
    zip(0 bytes)Available download formats
    Dataset updated
    Jun 3, 2020
    Authors
    SIDDHARTH M
    Description

    Context

    This is a dataset of DDoS Botnet attacks from IOT devices.

    Content

    Contains all features about packets from bots.

    Inspiration:

    For making DDoS attack preventable.

  9. Largest DDoS attacks size global 2021-2024

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Largest DDoS attacks size global 2021-2024 [Dataset]. https://www.statista.com/statistics/1557662/ddos-attacks-global-size/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    Between 2021 and 2024, the magnitude of the largest DDoS attacks have increased steadily. The attack with the largest breadth was recorded in 2024, reaching two Terabits per second.

  10. m

    DDOS ATTACKS DATASET FOR SOFTWARE DEFINED NETWORK

    • data.mendeley.com
    Updated Oct 9, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Aishatu Abdullahi Wabi (2023). DDOS ATTACKS DATASET FOR SOFTWARE DEFINED NETWORK [Dataset]. http://doi.org/10.17632/x6vr3sdm75.1
    Explore at:
    Dataset updated
    Oct 9, 2023
    Authors
    Aishatu Abdullahi Wabi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The dataset is made up of 12 features of normal and malicious UDP, ICMP, and TCP traffic from an SDN-emulated network. The features were extracted and computed from the Switch statistics. The dataset can be used for Traffic classification and DDOS attack detection in SDN using various machine learning, neural network, and statistical-based approaches.

  11. NCSRD-DS-5GDDoS: 5G Radio and Core metrics containing sporadic DDoS attacks

    • zenodo.org
    • data.europa.eu
    bin, csv, txt
    Updated Oct 7, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zenodo (2024). NCSRD-DS-5GDDoS: 5G Radio and Core metrics containing sporadic DDoS attacks [Dataset]. http://doi.org/10.5281/zenodo.13898091
    Explore at:
    csv, bin, txtAvailable download formats
    Dataset updated
    Oct 7, 2024
    Dataset provided by
    Zenodohttp://zenodo.org/
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    NCSRD-DS-5GDDos v2.0 Dataset
    ===
    NCSRD-DS-5GDDos is a comprehensive dataset recorded in a real-world 5G testbed that aligns with the 3GPP specifications. The dataset captures Distributed Denial of Service (DDoS) attacks initiated by malicious connected users (UEs).

    The setup comprises of 3 cells with a total of 9 UEs connected to the same core network. The 5G network is implemented by the Amarisoft Callbox Mini solution (cell 2), and we further employ a second cell using the Amarisoft Classic (cell 1 & 3), that also hosts the 5G core.

    The setup utilizes a broad set of UE devices comprising a set of smart phones (Huawei P40), microcomputers (Raspberry Pi 4 - Waveshare 5G Hat M2), industrial 5G routers (Industrial Waveshare 5G Router), a WiFi-6 mobile hotspot (DWR-2101 5G Wi-Fi 6 Mobile Hotspot) and a CPE box (Waveshare 5G CPE Box). All UEs are being operated by subsidiary hosts which are responsible for the traffic generation, occurring from scheduled communications times.

    All identifiers are artificially generated and do not represent or based on personal data. We identify each UE through its ‘imeisv’ ID, that corresponds to the device in use, due to vendor implementation, that uses the same IMSI for all UEs.

    This dataset captures attack data from a total of 5 malicious User Equipment (UE) devices that initiated various flooding attacks on a 5G network. Each record includes key identifiers such as the IMEISV (International Mobile Equipment Identity Software Version number) and IP address of the attacking UE, along with the device type. The file "summary_report.csv" summarizes this information. The traffic types used in the attacks include syn flooding, UDP flooding, ICMP flooding, DNS flooding, and GTP-U flooding. The benign users stream YouTube and Skype traffic.

    The dataset is recorded through the use of a data collector that interfaces with the 5G network and gathers data regarding UEs, gNBs and the Core Network. The data are recorded in an InfluxdB and pre-processed into three separate tabular .csv files for more efficient processing: “amari_ue_data.csv”, “enb_counters.csv” and “mme_counters.csv”. In this version, we use an Amarisoft Classic (cells 1 & 3, Core Network) and an Amarisoft Mini (cell 2) (more information on the products can be found in https://www.amarisoft.com/).

    The ”amari_ue_data.csv” provides information on the UEs regarding identification (“imeisv”, “5g_tmsi”, “rnti”), IP addressing, bearer information, cell information (“tac”, “ran_plmn”), and cell information (“ul_bitrate”, “dl_bitrate”, “cell_id”, retransmissions per user per cell “ul_retx” as well as aggregated bit rates for each cell).

    The ”enb_counters.csv” focuses on cell-level information, providing downlink and uplink bitrates, usage ratio per user, cpu load of the gNB.

    We provide separate files of ”amari_ue_data.csv” and ”enb_counters.csv” generated from each gNB (Amarisoft Classic and Mini).

    The “mme_counters.csv” provides information on the Non-Access Stratum (NAS) of the 5G Network and focuses on session status reports (e.g., number of PDU session establishments, paging, context setup. This part gives an overview of the connection management throughout the recording session, and provides information on features suggested by 3GPP for abnormal user behavior.

    We also provide a separate pre-processed dataset, that merges the two "amari_ue_data_*.csv" file, including labeling of the malicious/benign samples, and may be more flexible for interested data scientists.

    Please refer to README.txt for the features included in each file.

  12. DataFraggers_DDoSAttack_IIITBMLTP_DATA

    • kaggle.com
    zip
    Updated Dec 17, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Paritosh Bisht (2022). DataFraggers_DDoSAttack_IIITBMLTP_DATA [Dataset]. https://www.kaggle.com/datasets/bparitoshiiitb/datafraggers-ddosattack-iiitbmltp-data
    Explore at:
    zip(208531035 bytes)Available download formats
    Dataset updated
    Dec 17, 2022
    Authors
    Paritosh Bisht
    Description

    Dataset

    This dataset was created by Paritosh Bisht

    Contents

  13. SDN_TCP_ICMP_UDP DDOS

    • kaggle.com
    zip
    Updated Aug 19, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Muhammad Junaid Khalid (2022). SDN_TCP_ICMP_UDP DDOS [Dataset]. https://www.kaggle.com/datasets/muhammadjunaidkhalid/sdn-tcp-icmp-udp-ddos/data
    Explore at:
    zip(6558775 bytes)Available download formats
    Dataset updated
    Aug 19, 2022
    Authors
    Muhammad Junaid Khalid
    License

    Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
    License information was derived automatically

    Description

    This dataset is not my own dataset it is publicly available at Mendeley Data.

    Data consist of DDoS attacks in SDN which include the ICMP, TCP, and UDP flood. The attack was generated in Mininet Emulator using the Scapy and TCPReplay. The topology used was : sudo mn --topo tree,depth=3,fanout=2 --mac --controller remote,ip=0.0.0.0:6633 performed by H1 to H4

  14. Intrusion Detect. CICEV2023: DDoS Attack Profiling

    • kaggle.com
    zip
    Updated Mar 27, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Agung Pambudi (2025). Intrusion Detect. CICEV2023: DDoS Attack Profiling [Dataset]. https://www.kaggle.com/datasets/agungpambudi/secure-intrusion-detection-ddos-attacks-profiling
    Explore at:
    zip(231762852 bytes)Available download formats
    Dataset updated
    Mar 27, 2025
    Authors
    Agung Pambudi
    Description

    To cite the dataset please reference it as Y. Kim, S. Hakak, and A. Ghorbani. "DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure," in 2023 20th Annual International Conference on Privacy, Security and Trust (PST), IEEE Computer Society, pp. 1-9, August 2023.

    Explore a comprehensive dataset capturing DDoS attack scenarios within electric vehicle (EV) charging infrastructure. This dataset features diverse machine learning attributes, including packet access counts, system status details, and authentication profiles across multiple charging stations and grid services. Simulated attack scenarios, authentication protocols, and extensive profiling results offer invaluable insights for training and testing detection models in safeguarding EV charging systems against cyber threats.

    https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F5737185%2F2dec3a047fec426e0b6d2f7672d25016%2Fadjusted-5221113.jpg?generation=1743055158796994&alt=media" alt=""> Figure 1: Proposed simulator structure, source: Y. Kim, S. Hakak, and A. Ghorbani.


    Acknowledgment :

    The authors sincerely appreciate the support provided by the Canadian Institute for Cybersecurity (CIC), as well as the funding received from the Canada Research Chair and the Atlantic Canada Opportunities Agency (ACOA).


    Reference :

    Y. Kim, S. Hakak, and A. Ghorbani. "DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure," in 2023 20th Annual International Conference on Privacy, Security and Trust (PST), IEEE Computer Society, pp. 1-9, August 2023.

  15. m

    DDoS attack scoreboard dataset

    • data.mendeley.com
    Updated Aug 28, 2017
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Petar D. Bojovic (2017). DDoS attack scoreboard dataset [Dataset]. http://doi.org/10.17632/psjxnzsxyx.2
    Explore at:
    Dataset updated
    Aug 28, 2017
    Authors
    Petar D. Bojovic
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Scoreboard dataset contains statistical data for each second during the testing period. Scoreboard represents srcip:srcport-dstip:dstport pair with statistics count for the number of packets, protocol identification, flag (if it is TCP), and a number of SYN packets (if it is TCP). Each ip:port pair represents one communication channel.

  16. DoS/DDoS-MQTT-IoT

    • kaggle.com
    zip
    Updated Apr 20, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Alaa Alatram (2023). DoS/DDoS-MQTT-IoT [Dataset]. https://www.kaggle.com/datasets/alaaalatram/dosddos-mqtt-iot
    Explore at:
    zip(6831337928 bytes)Available download formats
    Dataset updated
    Apr 20, 2023
    Authors
    Alaa Alatram
    Description

    The DoS/DDoS-MQTT-IoT dataset is composed of both normal MQTT data as well as normal MQTT data mixed with abnormally attacked data. As for the abnormal data, it came in ten categories of DDoS and DoS attacks.

  17. Distribution of global DDoS attacks 2023, by industry

    • statista.com
    Updated Feb 2, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2026). Distribution of global DDoS attacks 2023, by industry [Dataset]. https://www.statista.com/statistics/1537973/ddos-attacks-global-by-industry/
    Explore at:
    Dataset updated
    Feb 2, 2026
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    In 2023, organizations in the finance industry worldwide saw the highest share of DDoS attacks, ** percent. The finance industry ranked second, with over ** percent, while healthcare followed, with **** percent.

  18. Industries impacted by DDoS attacks global Q3-Q4 2024

    • statista.com
    Updated Feb 2, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2026). Industries impacted by DDoS attacks global Q3-Q4 2024 [Dataset]. https://www.statista.com/statistics/1557685/ddos-attacks-global-impact-industries/
    Explore at:
    Dataset updated
    Feb 2, 2026
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    In the third and fourth quarters of 2024, the gaming was the industry most impacted by Distributed Denial-of-Service (DDoS) attacks. The industry saw around 34 percent of the registered DDoS attacks. Financial services ranked second, with roughly a quarter of attacks, followed by the technology industry, with 19 percent.

  19. DrDoS_DNS_R2l Balance

    • kaggle.com
    zip
    Updated Feb 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Williamson_5 (2024). DrDoS_DNS_R2l Balance [Dataset]. https://www.kaggle.com/datasets/williamson5/drdos-dns-r2l-balance
    Explore at:
    zip(697620 bytes)Available download formats
    Dataset updated
    Feb 18, 2024
    Authors
    Williamson_5
    License

    Apache License, v2.0https://www.apache.org/licenses/LICENSE-2.0
    License information was derived automatically

    Description

    DATASET [Taken from official website]

    CICDDoS2019 is a dataset that contains benign and most up-to-date common DDoS attacks that resemble true real-world data (PCAPs). However, this version, in CSV file format, includes the results of network traffic analysis using CICFlowMeter-V3 with flows labeled based on timestamp, source and destination IPs, source and destination ports, protocols, and attack.

    In this dataset, we have different modern reflective DDoS attacks such as PortMap, NetBIOS, LDAP, MSSQL, UDP, UDP-Lag, SYN, NTP, DNS and SNMP. Attacks were subsequently executed during this period. As Table III shows, we executed 12 DDoS attacks includes NTP, DNS, LDAP, MSSQL, NetBIOS, SNMP, SSDP, UDP, UDP-Lag, WebDDoS, SYN and TFTP on the training day and 7 attacks including PortScan, NetBIOS, LDAP, MSSQL, UDP, UDP-Lag and SYN in the testing day. The traffic volume for WebDDoS was so low and PortScan just has been executed in the testing day and will be unknown for evaluating the proposed model.

  20. DDoS attacks share in Russia 2023, by industry

    • statista.com
    Updated Feb 2, 2026
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2026). DDoS attacks share in Russia 2023, by industry [Dataset]. https://www.statista.com/statistics/1189519/ddos-attacks-distribution-in-russia-by-industry/
    Explore at:
    Dataset updated
    Feb 2, 2026
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Russia
    Description

    The finance industry was the major target of DDoS attacks in Russia in 2023. Furthermore, the share of attacks on e-commerce companies was almost ** percent. DDoS, or distributed denial-of-service attacks involve sending a high number of requests to a target network or website, more than it is capable of handling, leading to the disruption in the resource's functioning.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2026). DDoS attacks number global Q1 2023-Q2 2025 [Dataset]. https://www.statista.com/statistics/1557643/ddos-attacks-global-number/
Organization logo

DDoS attacks number global Q1 2023-Q2 2025

Explore at:
Dataset updated
Feb 19, 2026
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
Worldwide
Description

In the second quarter of 2025, around ******* DDoS attacks were registered worldwide. The figure has been increasing continuously over the observed period.

Search
Clear search
Close search
Google apps
Main menu