100+ datasets found
  1. f

    Network Intrusion Detection Datasets

    • figshare.com
    txt
    Updated May 30, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ogobuchi Daniel Okey; Demostenes Zegarra Rodriguez (2023). Network Intrusion Detection Datasets [Dataset]. http://doi.org/10.6084/m9.figshare.23118164.v1
    Explore at:
    txtAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    figshare
    Authors
    Ogobuchi Daniel Okey; Demostenes Zegarra Rodriguez
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    With the continuous expansion of data exchange, the threat of cybercrime and network invasions is also on the rise. This project aims to address these concerns by investigating an innovative approach: an Attentive Transformer Deep Learning Algorithm for Intrusion Detection of IoT Systems using Automatic Xplainable Feature Selection. The primary focus of this project is to develop an effective Intrusion Detection System (IDS) using the aforementioned algorithm. To accomplish this, carefully curated datasets have been utilized, which have been created through a meticulous process involving data extraction from the University of New Brunswick repository. This repository houses the datasets used in this research and can be accessed publically in order to replicate the findings of this research.

  2. Z

    Intruder Detection Systems Market by Type (Network Intrusion Detection...

    • zionmarketresearch.com
    pdf
    Updated Jun 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zion Market Research (2025). Intruder Detection Systems Market by Type (Network Intrusion Detection System (NIDS), Host-based Intrusion Detection System (HIDS), Perimeter Intrusion Detection Systems (PIDS), VM based Intrusion Detection Systems (VMIDS)), by Application (Commercial, Government, Military, BFSI, and others), and By Region - Global and Regional Industry Overview, Market Intelligence, Comprehensive Analysis, Historical Data, and Forecasts 2024 - 2032 [Dataset]. https://www.zionmarketresearch.com/report/intruder-detection-systems-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jun 30, 2025
    Dataset authored and provided by
    Zion Market Research
    License

    https://www.zionmarketresearch.com/privacy-policyhttps://www.zionmarketresearch.com/privacy-policy

    Time period covered
    2022 - 2030
    Area covered
    Global
    Description

    Intruder Detection Systems Market size is set to expand from $ 4.95 Billion in 2023 to $ 8.33 Billion by 2032, with an anticipated CAGR of around 5.3% from 2024 to 2032.

  3. I

    Intrusion Detection System Software Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Mar 6, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Intrusion Detection System Software Report [Dataset]. https://www.archivemarketresearch.com/reports/intrusion-detection-system-software-52033
    Explore at:
    pdf, ppt, docAvailable download formats
    Dataset updated
    Mar 6, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Intrusion Detection System (IDS) Software market is experiencing robust growth, driven by the escalating need for robust cybersecurity solutions across diverse sectors. The market's expansion is fueled by factors such as increasing cyberattacks, the growing adoption of cloud-based infrastructure, and the stringent regulatory compliance requirements mandating enhanced security measures. The rising adoption of IoT devices and the expanding attack surface they create are also significant contributors to market growth. Furthermore, the increasing sophistication of cyber threats demands advanced IDS solutions capable of detecting and responding to a wider range of attacks, fostering market expansion. We estimate the 2025 market size to be approximately $15 billion, reflecting strong growth from previous years. Considering a conservative compound annual growth rate (CAGR) of 12% over the forecast period (2025-2033), the market is poised to reach a significant value by 2033. The market is segmented by deployment type (on-premises and cloud-based) and target user (large enterprises and SMEs). Cloud-based solutions are gaining traction due to their scalability, cost-effectiveness, and ease of management. Large enterprises dominate the market due to their higher budgets and greater vulnerability to sophisticated cyberattacks. However, the increasing cyber security awareness amongst SMEs is driving growth within this segment. Geographic analysis shows that North America and Europe currently hold significant market share, largely due to higher technological adoption rates and robust cybersecurity infrastructure. However, growth in Asia-Pacific and other regions is expected to accelerate driven by increasing digitalization and rising cyber threats in these areas. Restraints to market growth include the high cost of implementing and maintaining sophisticated IDS systems, along with the need for skilled professionals to manage these solutions effectively. However, the increasing frequency and severity of cyberattacks are likely to outweigh these limitations, further driving market expansion in the coming years.

  4. Intrusion Detection and Prevention System Market Size, Share, Trend Analysis...

    • emergenresearch.com
    pdf,excel,csv,ppt
    Updated Dec 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Emergen Research (2024). Intrusion Detection and Prevention System Market Size, Share, Trend Analysis by 2033 [Dataset]. https://www.emergenresearch.com/industry-report/intrusion-detection-and-prevention-system-market
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Dec 22, 2024
    Dataset authored and provided by
    Emergen Research
    License

    https://www.emergenresearch.com/privacy-policyhttps://www.emergenresearch.com/privacy-policy

    Area covered
    Global
    Variables measured
    Base Year, No. of Pages, Growth Drivers, Forecast Period, Segments covered, Historical Data for, Pitfalls Challenges, 2033 Value Projection, Tables, Charts, and Figures, Forecast Period 2024 - 2033 CAGR, and 1 more
    Description

    The Intrusion Detection and Prevention System Market size is expected to reach a valuation of USD 9.06 billion in 2033 growing at a CAGR of 6.5%. The Intrusion Detection and Prevention System market research report classifies market by share, trend, demand, forecast and based on segmentation.

  5. Z

    Dataset for Network Intrusion Detection System on SCADA IEC 60870-5-104

    • data.niaid.nih.gov
    • zenodo.org
    Updated Aug 31, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    M. Agus Syamsul Arifin (2022). Dataset for Network Intrusion Detection System on SCADA IEC 60870-5-104 [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_7034533
    Explore at:
    Dataset updated
    Aug 31, 2022
    Dataset provided by
    Deris Stiawan
    M. Agus Syamsul Arifin
    Mohd Yazid Idris
    Susanto
    Rahmat Budiarto
    Description

    Security is the main challenge in Supervisory Control and Data Acquisition (SCADA) systems since SCADA systems must be connected to heterogeneous networks to save costs. SCADA devices such as RTUs have limited resources, so a small-scale cyber attack on a computer network will have a major impact on the SCADA system. This study discusses the SCADA system with the IEC 60870-5-104 protocol which is widely used in the power plant industry. A physical testbed is built to simulate the electrical distribution process. The SCADA system in the distribution section is more vulnerable than other parts because it is located directly in the community environment so that many holes can be entered by attackers. The purpose of this study is to obtain relevant datasets in the SCADA system. The simulation carried out in this study is a normal communication between the HMI and the RTU, then attacked to disrupt the communication. The attack activities carried out are port scan, brute force and DoS. DoS attacks carried out are ICMP flood, Syn flood, and IEC 104 flood. IEC 104 flood attack is a modified attack to attack RTU where RTU is flooded with an unknown typeid ASDU (Application Service Data Unit). Attacks are carried out using Kali Linux operating system. All scenarios are recorded and saved in pcap. To prove that there is attack data traffic on the IDS dataset Snort and Suricata are used to detect it. In this study, there are also intrusion detection performance results from Snort and Suricata

  6. I

    Intrusion Prevention Detection System Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Feb 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Intrusion Prevention Detection System Report [Dataset]. https://www.archivemarketresearch.com/reports/intrusion-prevention-detection-system-23063
    Explore at:
    ppt, pdf, docAvailable download formats
    Dataset updated
    Feb 13, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global intrusion prevention detection system (IPDS) market is projected to reach a value of USD 22.8 billion by 2033, exhibiting a CAGR of 10.5% during the forecast period (2025-2033). The rising need for network and data protection against cyber threats is a primary driver of this growth. Key market players include Cisco, IBM, Check Point, and HP. The market is segmented based on type (network intrusion detection solution, host-based intrusion detection solution), application (finance, government, IT and telecom, health, utilities), and region (North America, South America, Europe, Middle East & Africa, Asia Pacific). The increasing adoption of cloud computing, virtualization, and IoT devices has created new avenues for cybercriminals to exploit vulnerabilities and compromise systems. This has led to a growing demand for IPDS solutions that can provide real-time protection against sophisticated attacks. Additionally, government regulations and industry standards mandating the implementation of intrusion detection systems are driving the adoption of IPDS in various sectors. However, factors such as the high cost of implementation, operational complexity, and the availability of alternative security solutions may restrain the market's growth to some extent.

  7. m

    Data for: Research and Application of Intelligent Intrusion Detection System...

    • data.mendeley.com
    • narcis.nl
    Updated Dec 6, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Xianwei Hu (2017). Data for: Research and Application of Intelligent Intrusion Detection System with Accuracy Analysis Methodology [Dataset]. http://doi.org/10.17632/76t5wd88mf.1
    Explore at:
    Dataset updated
    Dec 6, 2017
    Authors
    Xianwei Hu
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Accuracy Analysis of Intrusion Detection System

  8. IoMT-TrafficData: A Dataset for Benchmarking Intrusion Detection in IoMT

    • zenodo.org
    • data.niaid.nih.gov
    Updated Aug 30, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    José Areia; José Areia; Ivo Afonso Bispo; Ivo Afonso Bispo; Leonel Santos; Leonel Santos; Rogério Luís Costa; Rogério Luís Costa (2024). IoMT-TrafficData: A Dataset for Benchmarking Intrusion Detection in IoMT [Dataset]. http://doi.org/10.5281/zenodo.8116338
    Explore at:
    Dataset updated
    Aug 30, 2024
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    José Areia; José Areia; Ivo Afonso Bispo; Ivo Afonso Bispo; Leonel Santos; Leonel Santos; Rogério Luís Costa; Rogério Luís Costa
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Article Information

    The work involved in developing the dataset and benchmarking its use of machine learning is set out in the article ‘IoMT-TrafficData: Dataset and Tools for Benchmarking Intrusion Detection in Internet of Medical Things’. DOI: 10.1109/ACCESS.2024.3437214.

    Please do cite the aforementioned article when using this dataset.

    Abstract

    The increasing importance of securing the Internet of Medical Things (IoMT) due to its vulnerabilities to cyber-attacks highlights the need for an effective intrusion detection system (IDS). In this study, our main objective was to develop a Machine Learning Model for the IoMT to enhance the security of medical devices and protect patients’ private data. To address this issue, we built a scenario that utilised the Internet of Things (IoT) and IoMT devices to simulate real-world attacks. We collected and cleaned data, pre-processed it, and provided it into our machine-learning model to detect intrusions in the network. Our results revealed significant improvements in all performance metrics, indicating robustness and reproducibility in real-world scenarios. This research has implications in the context of IoMT and cybersecurity, as it helps mitigate vulnerabilities and lowers the number of breaches occurring with the rapid growth of IoMT devices. The use of machine learning algorithms for intrusion detection systems is essential, and our study provides valuable insights and a road map for future research and the deployment of such systems in live environments. By implementing our findings, we can contribute to a safer and more secure IoMT ecosystem, safeguarding patient privacy and ensuring the integrity of medical data.

    ZIP Folder Content

    The ZIP folder comprises two main components: Captures and Datasets. Within the captures folder, we have included all the captures used in this project. These captures are organized into separate folders corresponding to the type of network analysis: BLE or IP-Based. Similarly, the datasets folder follows a similar organizational approach. It contains datasets categorized by type: BLE, IP-Based Packet, and IP-Based Flows.

    To cater to diverse analytical needs, the datasets are provided in two formats: CSV (Comma-Separated Values) and pickle. The CSV format facilitates seamless integration with various data analysis tools, while the pickle format preserves the intricate structures and relationships within the dataset.

    This organization enables researchers to easily locate and utilize the specific captures and datasets they require, based on their preferred network analysis type or dataset type. The availability of different formats further enhances the flexibility and usability of the provided data.

    Datasets' Content

    Within this dataset, three sub-datasets are available, namely BLE, IP-Based Packet, and IP-Based Flows. Below is a table of the features selected for each dataset and consequently used in the evaluation model within the provided work.

    Identified Key Features Within Bluetooth Dataset

    FeatureMeaning
    btle.advertising_headerBLE Advertising Packet Header
    btle.advertising_header.ch_selBLE Advertising Channel Selection Algorithm
    btle.advertising_header.lengthBLE Advertising Length
    btle.advertising_header.pdu_typeBLE Advertising PDU Type
    btle.advertising_header.randomized_rxBLE Advertising Rx Address
    btle.advertising_header.randomized_txBLE Advertising Tx Address
    btle.advertising_header.rfu.1Reserved For Future 1
    btle.advertising_header.rfu.2Reserved For Future 2
    btle.advertising_header.rfu.3Reserved For Future 3
    btle.advertising_header.rfu.4Reserved For Future 4
    btle.control.instantInstant Value Within a BLE Control Packet
    btle.crc.incorrectIncorrect CRC
    btle.extended_advertisingAdvertiser Data Information
    btle.extended_advertising.didAdvertiser Data Identifier
    btle.extended_advertising.sidAdvertiser Set Identifier
    btle.lengthBLE Length
    frame.cap_lenFrame Length Stored Into the Capture File
    frame.interface_idInterface ID
    frame.lenFrame Length Wire
    nordic_ble.board_idBoard ID
    nordic_ble.channelChannel Index
    nordic_ble.crcokIndicates if CRC is Correct
    nordic_ble.flagsFlags
    nordic_ble.packet_counterPacket Counter
    nordic_ble.packet_timePacket time (start to end)
    nordic_ble.phyPHY
    nordic_ble.protoverProtocol Version

    Identified Key Features Within IP-Based Packets Dataset

    FeatureMeaning
    http.content_lengthLength of content in an HTTP response
    http.requestHTTP request being made
    http.response.codeSequential number of an HTTP response
    http.response_numberSequential number of an HTTP response
    http.timeTime taken for an HTTP transaction
    tcp.analysis.initial_rttInitial round-trip time for TCP connection
    tcp.connection.finTCP connection termination with a FIN flag
    tcp.connection.synTCP connection initiation with SYN flag
    tcp.connection.synackTCP connection establishment with SYN-ACK flags
    tcp.flags.cwrCongestion Window Reduced flag in TCP
    tcp.flags.ecnExplicit Congestion Notification flag in TCP
    tcp.flags.finFIN flag in TCP
    tcp.flags.nsNonce Sum flag in TCP
    tcp.flags.resReserved flags in TCP
    tcp.flags.synSYN flag in TCP
    tcp.flags.urgUrgent flag in TCP
    tcp.urgent_pointerPointer to urgent data in TCP
    ip.frag_offsetFragment offset in IP packets
    eth.dst.igEthernet destination is in the internal network group
    eth.src.igEthernet source is in the internal network group
    eth.src.lgEthernet source is in the local network group
    eth.src_not_groupEthernet source is not in any network group
    arp.isannouncementIndicates if an ARP message is an announcement

    Identified Key Features Within IP-Based Flows Dataset

    FeatureMeaning
    protoTransport layer protocol of the connection
    serviceIdentification of an application protocol
    orig_bytesOriginator payload bytes
    resp_bytesResponder payload bytes
    historyConnection state history
    orig_pktsOriginator sent packets
    resp_pktsResponder sent packets
    flow_durationLength of the flow in seconds
    fwd_pkts_totForward packets total
    bwd_pkts_totBackward packets total
    fwd_data_pkts_totForward data packets total
    bwd_data_pkts_totBackward data packets total
    fwd_pkts_per_secForward packets per second
    bwd_pkts_per_secBackward packets per second
    flow_pkts_per_secFlow packets per second
    fwd_header_sizeForward header bytes
    bwd_header_sizeBackward header bytes
    fwd_pkts_payloadForward payload bytes
    bwd_pkts_payloadBackward payload bytes
    flow_pkts_payloadFlow payload bytes
    fwd_iatForward inter-arrival time
    bwd_iatBackward inter-arrival time
    flow_iatFlow inter-arrival time
    activeFlow active duration
  9. c

    Global Perimeter Intrusion Detection Systems Market Report 2025 Edition,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Apr 30, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2025). Global Perimeter Intrusion Detection Systems Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/perimeter-intrusion-detection-systems-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Apr 30, 2025
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the global Perimeter Intrusion Detection Systems market size is USD 25.1 billion in 2024 and will expand at a compound annual growth rate (CAGR) of 15.2% from 2024 to 2031. Market Dynamics of Perimeter Intrusion Detection Systems Market

    Key Drivers for Perimeter Intrusion Detection Systems Market

    The proliferation of smart city infrastructures- In addition to providing real-time feedback to identify the need for maintenance, smart buildings can also provide space management or structural health monitoring. Furthermore, the market growth is being driven by the following factors: growing sophistication in cross-border infiltration, digitalization, volatile geopolitics, an increase in the number of unlawful intrusions, and a greater emphasis on perimeter protection by the government. Additionally, the market is being driven by the rising population, the development of digital infrastructures globalization, economic growth, rapid urbanization, the demand for efficient resource utilization management, public safety concerns, and the emerging demand for a society with efficient energy utilization. Furthermore, market expansion is anticipated to be spurred by the increasing prevalence of nanotechnology, big data analytics, artificial intelligence (A.I.), Internet of Things (IoT), machine learning (ML), cloud computing, cognitive computing, and open data.
    Rising number of security System video surveillance installations is anticipated to drive the Perimeter Intrusion Detection Systems market's expansion in the years ahead.
    

    Key Restraints for Perimeter Intrusion Detection Systems Market

    The incorporation of new technologies into existing systems may poses a serious threat to the Perimeter Intrusion Detection Systems industry.
    The market also faces significant difficulties related to installation and maintenance are expensive for SMEs.
    

    Introduction of the Perimeter Intrusion Detection Systems Market

    A perimeter intrusion detection system (PIDS) is employed to identify, monitor, and trace an unauthorized physical intruder who is attempting to infiltrate a secured area. It consists of active infrared or microwave systems, cables, and sensors that are either embedded underground or mounted on a fence. Additionally, it features audio alarm verification, which enables operators to respond promptly and effectively. Furthermore, it assists in the analysis of threats, the management of risks, the protection of assets, critical infrastructure, and borders, and the assurance of personnel safety. In recent years, a multi-layered approach has garnered traction, which employs a combination of video analytics to characterize intruders and ground-based sensors to detect potential intrusions. As a result, PDIS is extensively employed in a variety of locations, including military bases, government agencies, critical infrastructure, correctional institutions, petrochemical sites, airports, and storage yards, on a global scale.

  10. Z

    Dataset to Train Intrusion Detection Systems based on Machine Learning...

    • data.niaid.nih.gov
    Updated Feb 13, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Hernández Gañán, Carlos (2025). Dataset to Train Intrusion Detection Systems based on Machine Learning Models for Electrical Substations [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_13898982
    Explore at:
    Dataset updated
    Feb 13, 2025
    Dataset provided by
    Kotsiuba, Igor
    Gutierrez Mlot, Esteban Damian
    Hernández Gañán, Carlos
    Rodríguez, Ricardo J.
    Saldana, Jose
    License

    Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)https://creativecommons.org/licenses/by-nc-sa/4.0/
    License information was derived automatically

    Description

    DATASET

    This dataset is part of the research work titled "A dataset to train intrusion detection systems based on machine learning models for electrical substations". The dataset has been meticulously curated to support the development and evaluation of machine learning models tailored for detecting cyber intrusions in the context of electrical substations. It is intended to facilitate research and advancements in cybersecurity for critical infrastructure, specifically focusing on real-world scenarios within electrical substation environments. We encourage its use for experimentation and benchmarking in related areas of study.

    The following sections list the content of the dataset generated.

    Data

    raw

    iec6180

    attack-free-data

    capture61850-attackfree.pcap (from real substation)

    capture61850-attackfree_PTP.pcap

    capture61850-attackfree_normalfault.pcap

    attack-data

    capture61850-floodattack_withfault.pcap

    capture61850-floodattack_withoutfault.pcap

    capture61850-fuzzyattack_withfault.pcap

    capture61850-fuzzyattack_withoutfault.pcap

    capture61850-replay.pcap

    capture61850-ptpattack.pcap

    iec104

    attack-free-data

    capture104-attackfree.pcap (from real substation)

    attack-data

    capture104-dosattack.pcap

    capture104-floodattack.pcap

    capture104-fuzzyattack.pcap

    capture104-iec104starvationattack.pcap

    capture104-mitmattack.pcap

    capture104-ntpddosattack.pcap

    capture104-portscanattack.pcap

    processed

    iec6180

    attack-free-data

    capture61850-attackfree.csv

    capture61850-attackfree_PTP.csv

    capture61850-attackfree_normalfault.csv

    attack-data

    capture61850-floodattack_withfault.csv

    capture61850-floodattack_withoutfault.csv

    capture61850-fuzzyattack_withfault.csv

    capture61850-fuzzyattack_withoutfault.csv

    capture61850-replay.csv

    capture61850-ptpattack.csv

    headers_iec61850[all].txt

    iec104

    attack-free-data

    capture104-attackfree.csv

    attack-data

    capture104-dosattack.csv

    capture104-floodattack.csv

    capture104-fuzzyattack.csv

    capture104-iec104starvationattack.csv

    capture104-mitmattack.csv

    capture104-ntpddosattack.csv

    capture104-portscanattack.csv

    headers_iec104[all].txt

    Description

    file type: it may be captured61850 or captured104 depending on whether it contains network captures of the protocol IEC61850 or IEC104.

    attack: attack free (attackfree) or attack name is added to the file name.

    function: optionally, if there are some details about functionality captured (normalfault) or specific protocol capture (PTP).

    file extension: the type can be PCAP (network capture) or CSV (flow file).

    Results

    results

    test1-iec104

    model-test1-iec104.pkl

    test1-iec104.log

    test1-iec61850

    model-test1-iec61850.pkl

    test1-iec61850.log

    test2-iec61850

    model-test2-iec61850.pkl

    test2-iec61850.log

    Description

    The outcomes of different test executions are available as follows:

    test1-iec104: IEC 104 protocol for all attacks and attack free scenario

    test1-iec61850: IEC 61850 protocol for fuzzy attack with fault injection and attack free scenario

    test2-iec61850: IEC 61850 protocol for fuzzy attack normal operation and attack free scenario

    Each test consists of the model results in Python pickle format (with a .pkl extension) and a detailed description of the execution conditions in an output log file (with a .log extension).

    Source Code

    Tools to process network captures from IEC61850 and IEC104 can be found at github repository.

  11. IoT Intrusion Detection

    • kaggle.com
    Updated Jul 16, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cyber Cop (2023). IoT Intrusion Detection [Dataset]. http://doi.org/10.34740/kaggle/dsv/6142327
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jul 16, 2023
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Cyber Cop
    License

    http://www.gnu.org/licenses/lgpl-3.0.htmlhttp://www.gnu.org/licenses/lgpl-3.0.html

    Description

    The dataset has been introduced by the below-mentioned researches: E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, A. A. Ghorbani. "CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment," Sensor (2023) – (submitted to Journal of Sensors). The present data contains different kinds of IoT intrusions. The categories of the IoT intrusions enlisted in the data are as follows: DDoS Brute Force Spoofing DoS Recon Web-based Mirai

    There are several subcategories are present in the data for each kind of intrusion types in the IoT. The dataset contains 1191264 instances of network for intrusions and 47 features of each of the intrusions. The dataset can be used to prepare the predictive model through which different kind of intrusive attacks can be detected. The data is also suitable for designing the IDS system.

  12. f

    Logs in ROAD CAN intrusion detection dataset.

    • plos.figshare.com
    xls
    Updated Jan 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Miki E. Verma; Robert A. Bridges; Michael D. Iannacone; Samuel C. Hollifield; Pablo Moriano; Steven C. Hespeler; Bill Kay; Frank L. Combs (2024). Logs in ROAD CAN intrusion detection dataset. [Dataset]. http://doi.org/10.1371/journal.pone.0296879.t005
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jan 22, 2024
    Dataset provided by
    PLOS ONE
    Authors
    Miki E. Verma; Robert A. Bridges; Michael D. Iannacone; Samuel C. Hollifield; Pablo Moriano; Steven C. Hespeler; Bill Kay; Frank L. Combs
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Although ubiquitous in modern vehicles, Controller Area Networks (CANs) lack basic security properties and are easily exploitable. A rapidly growing field of CAN security research has emerged that seeks to detect intrusions or anomalies on CANs. Producing vehicular CAN data with a variety of intrusions is a difficult task for most researchers as it requires expensive assets and deep expertise. To illuminate this task, we introduce the first comprehensive guide to the existing open CAN intrusion detection system (IDS) datasets. We categorize attacks on CANs including fabrication (adding frames, e.g., flooding or targeting and ID), suspension (removing an ID’s frames), and masquerade attacks (spoofed frames sent in lieu of suspended ones). We provide a quality analysis of each dataset; an enumeration of each datasets’ attacks, benefits, and drawbacks; categorization as real vs. simulated CAN data and real vs. simulated attacks; whether the data is raw CAN data or signal-translated; number of vehicles/CANs; quantity in terms of time; and finally a suggested use case of each dataset. State-of-the-art public CAN IDS datasets are limited to real fabrication (simple message injection) attacks and simulated attacks often in synthetic data, lacking fidelity. In general, the physical effects of attacks on the vehicle are not verified in the available datasets. Only one dataset provides signal-translated data but is missing a corresponding “raw” binary version. This issue pigeon-holes CAN IDS research into testing on limited and often inappropriate data (usually with attacks that are too easily detectable to truly test the method). The scarcity of appropriate data has stymied comparability and reproducibility of results for researchers. As our primary contribution, we present the Real ORNL Automotive Dynamometer (ROAD) CAN IDS dataset, consisting of over 3.5 hours of one vehicle’s CAN data. ROAD contains ambient data recorded during a diverse set of activities, and attacks of increasing stealth with multiple variants and instances of real (i.e. non-simulated) fuzzing, fabrication, unique advanced attacks, and simulated masquerade attacks. To facilitate a benchmark for CAN IDS methods that require signal-translated inputs, we also provide the signal time series format for many of the CAN captures. Our contributions aim to facilitate appropriate benchmarking and needed comparability in the CAN IDS research field.

  13. A

    Intrusion Detection & Protection System Market Study by On-premise and SaaS...

    • factmr.com
    csv, pdf
    Updated May 27, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Fact.MR (2024). Intrusion Detection & Protection System Market Study by On-premise and SaaS for BFSI, Healthcare, IT & Telecom, Retail, Energy & Utilities, and Manufacturing from 2024 to 2034 [Dataset]. https://www.factmr.com/report/359/intrusion-detection-protection-system-market
    Explore at:
    csv, pdfAvailable download formats
    Dataset updated
    May 27, 2024
    License

    https://www.factmr.com/privacy-policyhttps://www.factmr.com/privacy-policy

    Time period covered
    2024 - 2034
    Area covered
    Worldwide
    Description

    The global intrusion detection & protection system market has been valued at US$ 6.8 billion in 2024, as revealed in the updated Fact.MR research report. Market revenue has been forecasted to increase at a CAGR of 11% and reach US$ 19.2 billion by the end of 2034.

    Report AttributeDetail
    Intrusion Detection & Protection System Market Size (2024E)US$ 6.8 Billion
    Forecasted Market Value (2034F)US$ 19.2 Billion
    Global Market Growth Rate (2024 to 2034)11% CAGR
    Japan Market Growth Rate (2024 to 2034)12.5% CAGR
    Market Share of BFSI Sector (2034F)25%
    North America Market Share (2034F)24.6%
    Key Companies ProfiledCheckPoint Security Software Market; IBM; Trustwave; Cisco Systems; SourceFire; Juniper Networks Inc.; Symantec Corporation; McAfee; Palo Alto Networks; Trend Micro; Fortinet; TippingPoint.

    Country-wise Insights

    AttributeUnited States
    Market Value (2024E)US$ 769 Million
    Growth Rate (2024 to 2034)10.9% CAGR
    Projected Value (2034F)US$ 2.2 Billion
    AttributeChina
    Market Value (2024E)US$ 762 Million
    Growth Rate (2024 to 2034)12% CAGR
    Projected Value (2034F)US$ 2.4 Billion
    AttributeJapan
    Market Value (2024E)US$ 450 Million
    Growth Rate (2024 to 2034)12.5% CAGR
    Projected Value (2034F)US$ 1.5 Billion

    Category-wise Insights

    AttributeSmall & Medium Enterprises
    Segment Value (2024E)US$ 4.9 Billion
    Growth Rate (2024 to 2034)10.4% CAGR
    Projected Value (2034F)US$ 13.1 Billion
    AttributeBFSI
    Segment Value (2024E)US$ 1.9 Billion
    Growth Rate (2024 to 2034)9.7% CAGR
    Projected Value (2034F)US$ 4.8 Billion
  14. m

    Global Physical Intrusion Detection And Prevention Systems Market Analysis,...

    • marketresearchintellect.com
    Updated Jul 8, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Intellect (2025). Global Physical Intrusion Detection And Prevention Systems Market Analysis, Share & Industry Outlook 2033 [Dataset]. https://www.marketresearchintellect.com/product/physical-intrusion-detection-and-prevention-systems-market/
    Explore at:
    Dataset updated
    Jul 8, 2025
    Dataset authored and provided by
    Market Research Intellect
    License

    https://www.marketresearchintellect.com/privacy-policyhttps://www.marketresearchintellect.com/privacy-policy

    Area covered
    Global
    Description

    Stay updated with Market Research Intellect's Physical Intrusion Detection And Prevention Systems Market Report, valued at USD 5.98 billion in 2024, projected to reach USD 10.23 billion by 2033 with a CAGR of 7.4% (2026-2033).

  15. e

    Perimeter Intrusion Detection System Market Size, Share, Trend Analysis by...

    • emergenresearch.com
    pdf,excel,csv,ppt
    Updated Jan 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Emergen Research (2025). Perimeter Intrusion Detection System Market Size, Share, Trend Analysis by 2033 [Dataset]. https://www.emergenresearch.com/industry-report/perimeter-intrusion-detection-system-market
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Jan 21, 2025
    Dataset authored and provided by
    Emergen Research
    License

    https://www.emergenresearch.com/privacy-policyhttps://www.emergenresearch.com/privacy-policy

    Area covered
    Global
    Variables measured
    Base Year, No. of Pages, Growth Drivers, Forecast Period, Segments covered, Historical Data for, Pitfalls Challenges, 2033 Value Projection, Tables, Charts, and Figures, Forecast Period 2024 - 2033 CAGR, and 1 more
    Description

    The Perimeter Intrusion Detection System Market size is expected to reach a valuation of USD 44.67 billion in 2033 growing at a CAGR of 8.50%. The Perimeter Intrusion Detection System Market research report classifies market by share, trend, demand, forecast and based on segmentation.

  16. Z

    Perimeter Intrusion Detection Systems Market By sensor (microwave sensors,...

    • zionmarketresearch.com
    pdf
    Updated Jul 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zion Market Research (2025). Perimeter Intrusion Detection Systems Market By sensor (microwave sensors, fiber-optic sensors, infrared sensors, radar sensors, and others), By service (managed services, risk assessment & analysis, system integration & consulting, and maintenance & support), By deployment type (fence mounted, open area, and buried), By industrial vertical (military & defense, transportation, correctional facilities, critical infrastructure, government, industrial, and commercial) And By Region: - Global And Regional Industry Overview, Market Intelligence, Comprehensive Analysis, Historical Data, And Forecasts, 2023-2030 [Dataset]. https://www.zionmarketresearch.com/report/perimeter-intrusion-detection-systems-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jul 13, 2025
    Dataset authored and provided by
    Zion Market Research
    License

    https://www.zionmarketresearch.com/privacy-policyhttps://www.zionmarketresearch.com/privacy-policy

    Time period covered
    2022 - 2030
    Area covered
    Global
    Description

    Perimeter Intrusion Detection Systems Market valued at $13.26 B in 2023, and is projected to $USD 44.08 B by 2032, at a CAGR of 14.28% from 2023 to 2032.

  17. m

    Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market Size...

    • marketresearchintellect.com
    Updated Jul 7, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Intellect (2025). Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market Size And Projections [Dataset]. https://www.marketresearchintellect.com/product/intrusion-detection-systemintrusion-prevention-system-idsips-market/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Market Research Intellect
    License

    https://www.marketresearchintellect.com/privacy-policyhttps://www.marketresearchintellect.com/privacy-policy

    Area covered
    Global
    Description

    Learn more about Market Research Intellect's Intrusion Detection SystemIntrusion Prevention System (IDSIPS) Market Report, valued at USD 4.5 billion in 2024, and set to grow to USD 9.2 billion by 2033 with a CAGR of 8.9% (2026-2033).

  18. m

    Intrusion Detection Systems Market Size And Projections

    • marketresearchintellect.com
    Updated Jul 4, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Intellect (2025). Intrusion Detection Systems Market Size And Projections [Dataset]. https://www.marketresearchintellect.com/product/intrusion-detection-systems-market/
    Explore at:
    Dataset updated
    Jul 4, 2025
    Dataset authored and provided by
    Market Research Intellect
    License

    https://www.marketresearchintellect.com/privacy-policyhttps://www.marketresearchintellect.com/privacy-policy

    Area covered
    Global
    Description

    Dive into Market Research Intellect's Intrusion Detection Systems Market Report, valued at USD 5.5 billion in 2024, and forecast to reach USD 9.2 billion by 2033, growing at a CAGR of 7.3% from 2026 to 2033.

  19. I

    Intrusion Detection System Software Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Feb 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Intrusion Detection System Software Report [Dataset]. https://www.archivemarketresearch.com/reports/intrusion-detection-system-software-38461
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Feb 20, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global intrusion detection system (IDS) software market size was valued at USD 12.2 billion in 2022 and is expected to expand at a compound annual growth rate (CAGR) of 13.3% from 2023 to 2030. The rising number of cyber-attacks, increasing adoption of cloud-based services, and stringent government regulations are driving the market growth. Key factors driving the market growth include the increasing sophistication of cyber threats, the growing adoption of cloud computing, and the increasing demand for real-time threat detection and response. The market is also expected to benefit from the growing adoption of artificial intelligence (AI) and machine learning (ML) in IDS software, which can help to improve the accuracy and efficiency of threat detection. Additionally, the market is expected to be driven by the increasing demand for IDS software from small and medium-sized businesses (SMBs).

  20. t

    Perimeter Intrusion Detection System Global Market Report 2025

    • thebusinessresearchcompany.com
    pdf,excel,csv,ppt
    Updated Jan 15, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    The Business Research Company (2025). Perimeter Intrusion Detection System Global Market Report 2025 [Dataset]. https://www.thebusinessresearchcompany.com/report/perimeter-intrusion-detection-system-global-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Jan 15, 2025
    Dataset authored and provided by
    The Business Research Company
    License

    https://www.thebusinessresearchcompany.com/privacy-policyhttps://www.thebusinessresearchcompany.com/privacy-policy

    Description

    Global Perimeter Intrusion Detection System market size is expected to reach $44.98 billion by 2029 at 18.3%, segmented as by hardware, intrusion detection sensors, access control systems, surveillance cameras, fencing and barriers, alarm systems

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Ogobuchi Daniel Okey; Demostenes Zegarra Rodriguez (2023). Network Intrusion Detection Datasets [Dataset]. http://doi.org/10.6084/m9.figshare.23118164.v1

Network Intrusion Detection Datasets

Explore at:
txtAvailable download formats
Dataset updated
May 30, 2023
Dataset provided by
figshare
Authors
Ogobuchi Daniel Okey; Demostenes Zegarra Rodriguez
License

Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically

Description

With the continuous expansion of data exchange, the threat of cybercrime and network invasions is also on the rise. This project aims to address these concerns by investigating an innovative approach: an Attentive Transformer Deep Learning Algorithm for Intrusion Detection of IoT Systems using Automatic Xplainable Feature Selection. The primary focus of this project is to develop an effective Intrusion Detection System (IDS) using the aforementioned algorithm. To accomplish this, carefully curated datasets have been utilized, which have been created through a meticulous process involving data extraction from the University of New Brunswick repository. This repository houses the datasets used in this research and can be accessed publically in order to replicate the findings of this research.

Search
Clear search
Close search
Google apps
Main menu