IIoT Dataset 2025 | Datasets | Research | Canadian Institute for Cybersecurity | UNB

Global Site Navigation (use tab and down arrow)

Canadian Institute for Cybersecurity

DataSense: CIC IIoT dataset 2025

A Real-Time Sensor-Based Benchmark Dataset for Attack Analysis in IIoT with Multi-Objective Feature Selection

The focus of this research is on creating a realistic IIoT dataset enriched with synchronized sensor and network data, complemented by a novel feature selection method to enhance anomaly detection accuracy while minimizing resource usage—bringing academic advances closer to practical IIoT security solutions.

Main contributions:

  • Designed and implemented a realistic IIoT testbed with diverse industrial sensors, IoT devices, and network infrastructure.
  • Collected synchronized time-series sensor data and network traffic streams to enable holistic security analysis.
  • Executed and recorded 50 distinct attack types across seven categories to capture diverse, realistic threat scenarios.
  • Proposed and validated a novel multi-objective feature selection method that enhances detection accuracy and reduces resource usage.
  • Developed a benchmark integrating ML and DL methods for real-time detection and classification of cyberattacks.
  • Conducted extensive experiments profiling detection performance and resource utilization under various operational conditions.

CIC IoT/IIoT lab

Developing a realistic IIoT testbed is a complex undertaking due to the heterogeneity of devices, communication protocols, and the substantial financial and technical resources required. Simulations or small-scale setups often fail to reflect the nuanced behaviors of real deployments. To address this gap, the Canadian Institute for Cybersecurity (CIC) established a dedicated IoT and IIoT laboratory featuring a sophisticated network infrastructure and 40 interconnected devices. These include over 15 types of industrial sensors built from scratch using Arduino boards alongside real industrial sensors, as well as network equipment, IoT devices, edge devices, and attacker systems—together providing a rich environment for experimentation.

The proposed testbed architecture is composed of five primary layers: the IoT/IIoT Layer, Network Infrastructure, Edge Layer, Cloud Layer, and Attacker Layer. By integrating diverse device types across these interconnected layers, the testbed replicates the complexity and heterogeneity of industrial environments, supporting comprehensive research into anomaly detection, intrusion detection, and resilience mechanisms in IIoT systems.

Testbed setup         Attack framework

Data descriptions

  • 12 Hours of normal testbed execution
  • Total: 259,212 packets, 72,554 logs

  • Ack Fragmentation Flood
  • Connect Flood
  • HTTP Flood
  • ICMP Flood
  • ICMP Fragmentation Flood
  • MQTT Publish Flood
  • PSHACK Flood
  • RSTFIN Flood
  • Slowloris
  • TCP SYN Flood
  • Synonymous IP Flood
  • TCP Flood
  • UDP Flood
  • UDP Fragmentation Flood
  • Total: 1,142,218,766 packets, 298,576 logs

  • Ack Fragmentation Flood
  • Connect Flood
  • HTTP Flood
  • ICMP Flood
  • ICMP Fragmentation Flood
  • MQTT Publish Flood
  • PSHACK Flood
  • RSTFIN Flood
  • Slowloris
  • TCP SYN Flood
  • Synonymous IP Flood
  • TCP Flood
  • UDP Flood
  • UDP Fragmentation Flood
  • Total: 537,520,150 packets, 227,553 logs

  • Host Discovery ARP Ping
  • Host Discovery TCP ACK Ping
  • Host Discovery TCP SYN Ping
  • Host Discovery TCP SYN Stealth
  • Host Discovery UDP Ping
  • OS Scan
  • Ping Sweep
  • Port Scan
  • Vulnerability Scan
  • Total: 15,790,215 packets, 689,041 logs

  • Backdoor Upload
  • Command Injection
  • SQL Injection
  • Blind SQL Injection
  • Cross Site Scripting
  • Total: 589,958 packets, 56,242 logs

  • SSH Bruteforce
  • Telnet Bruteforce
  • Total: 126,818 packets, 37,675 logs

  • ARP Spoofing
  • Impersonation
  • IP Spoofing
  • Total: 125,661,271 packets, 166,831 logs

  • Syn Flood
  • UDP Flood
  • Total: 1,474,429 packets, 152,534 logs

Number of packets for each attack scenario

Number of logs for each attack scenario

Number of packets/logs per category

Acknowledgments

The authors would like to thank the Canadian Institute for Cybersecurity (CIC) for its financial and educational support.

Citation

Firouzi, A.; Dadkhah, S.; Maret, S.A.; Ghorbani, A.A. "DataSense: A Real-Time Sensor-Based Benchmark Dataset for Attack Analysis in IIoT with Multi-Objective Feature Selection." Electronics, 14, 4095, 2025.

Download the dataset