Skip to main content Skip to local navigation
Home » Data Analyzers & Datasets » Cybersecurity Datasets

Cybersecurity Datasets

As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we generate and release cybersecurity datasets to support students, researchers, and developers in analyzing, testing, and evaluating their cybersecurity models, solutions, and tools.

8. Intrusion Detection Dataset (BCCC-CIC-IDS2017)

Using NLFlowLyzer, we successfully generated the “BCCC-CIC-IDS2017” dataset by extracting key flows from raw network traffic data of CIC-IDS2017, resulting in CSV files integrating essential network and transport layer features. This new dataset offers a structured approach for analyzing intrusion detection, combining diverse traffic types into multiple sub-categories. The “BCCC-CIC-IDS2017” dataset enriches the depth and variety needed to rigorously evaluate our proposed profiling model, advancing research in network security and enhancing the development of intrusion detection systems.

The full research paper outlining the details of the dataset and its underlying principles:

NTLFlowLyzer: Toward Generating an Intrusion Detection Dataset and Intruders Behavior Profiling through Network Layer Traffic Analysis and Pattern Extraction, MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computer & Security, Computers & Security, 104160, ISSN 0167-4048 (2024)”

Download Dataset:

7. Tabular IoT Attack Dataset (CIC-BCCC-NRC TabularIoTAttack-2024)

The CIC-BCCC-NRC TabularIoTAttack-2024 dataset is a comprehensive collection of IoT network traffic data generated as part of an advanced effort to create a reliable source for training and testing AI-powered IoT cybersecurity models. This dataset is designed to address modern challenges in detecting and identifying IoT-specific cyberattacks, offering a rich and diverse set of labeled data that reflects realistic IoT network behaviours. The dataset extracted a wide array of network characteristics using CICFlowMeter, with each record containing relevant features such as network flows, timestamps, source/destination IPs, and attack labels.

The full research paper outlining the details of the dataset and its underlying principles:

An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic”, Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, 2024, ISSN 2949-7159, https://doi.org/10.1016/j.jiixd.2024.09.001

Download Dataset:

6. Malicious DNS and Attacks (BCCC-CIC-Bell-DNS-2024)

Using ALFlowLyzer, we successfully generated an augmented dataset, “BCCC-CIC-Bell-DNS-2024,” from two existing datasets: “CIC-Bell-DNS-2021” and “CIC-Bell-DNS-EXF-2021.” ALFlowLyzer enabled the extraction of essential flows from raw network traffic data, resulting in CSV files that integrate DNS metadata and application layer features. This new dataset combines light and heavy data exfiltration traffic into six unique sub-categories, providing a comprehensive structure for analyzing DNS data exfiltration attacks. The “BCCC-CIC-Bell-DNS-2024” dataset enhances the richness and diversity needed to evaluate our proposed profiling model effectively.

The full research paper outlining the details of the dataset and its underlying principles:

“Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis”, Shafi, MohammadMoein, Arash Habibi Lashkari, Hardhik Mohanty; Computers and Electrical Engineering, 2024

Download Dataset:

5. Cloud DDoS Attacks (BCCC-cPacket-Cloud-DDoS-2024)

The distributed denial of service attack poses a significant threat to network security. The effectiveness of new detection methods depends heavily on well-constructed datasets. After conducting an in-depth analysis of 16 publicly available datasets and identifying their shortcomings across various dimensions, the ‘BCCC-cPacket-Cloud-DDoS-2024’ is meticulously created, addressing challenges identified in previous datasets through a cloud infrastructure. The dataset contains over eight benign user activities and 17 DDoS attack scenarios. The dataset is fully labeled (with a total of 26 labels) with over 300 features extracted from the network and transport layers of the traffic flows using NTLFlowLyzer. The dataset’s extensive size and comprehensive features make it a valuable resource for researchers and practitioners to develop and validate more robust and accurate DDoS detection and mitigation strategies. Furthermore, researchers can leverage the ‘BCCC-cPacket-Cloud-DDoS-2024’ dataset to train learning-based models aimed at predicting benign user behavior, detecting attacks, identifying patterns, classifying network data, etc.

The full research paper outlining the details of the dataset and its underlying principles:

“Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization”, Shafi, MohammadMoein, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo.; Information 15, no. 4: 195. https://doi.org/10.3390/info15040195

Download Dataset:

4. DNS over HTTPS ( BCCC-CIRA-CIC-DoHBrw-2020 )

The ‘BCCC-CIRA-CIC-DoHBrw-2020’ as an augmented dataset was created to address the imbalance in the ‘CIRA-CIC-DoBre-2020’ dataset. Unlike the ‘CIRA-CIC-DoHBrw-2020’ dataset, which is skewed with about 90% malicious and only 10% benign Domain over HTTPS (DoH) network traffic, the ‘BCCC-CIRA-CIC-DoHBrw-2020’ dataset offers a more balanced composition. It includes equal numbers of malicious and benign DoH network traffic instances, with 249,836 instances in each category. This balance was achieved using the Synthetic Minority Over-sampling Technique (SMOTE). The ‘BCCC-CIRA-CIC-DoHBrw-2020’ dataset comprises three CSV files: one for malicious DoH traffic, one for benign DoH traffic, and a third that combines both types. 

The full research paper outlining the details of the dataset and its underlying principles:

“Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning“, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023

Download Dataset:

3. Vulnerable Smart Contracts (BCCC-VulSCs-2023)

The BCCC-VulSCs-2023 dataset is a substantial collection for Solidity Smart Contracts (SCs) analysis, comprising 36,670 samples, each enriched with 70 feature columns. These features include the raw source code of the smart contract, a hashed version of the source code for secure referencing, and a binary label that indicates a contract as secure (0) or vulnerable (1). The dataset’s extensive size and comprehensive features make it a valuable resource for machine-learning models to predict contract behavior, identify patterns, or classify contracts based on security and functionality criteria.

The full research paper outlining the details of the dataset and its underlying principles:

“Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023

Download Dataset:

2. SQL Injection Attack (BCCC-SFU-SQLInj-2023)

This dataset consists of a collection of 11,012 evasive or sophisticated malicious SQL queries. These queries are generated using a genetic algorithm applied to the Kaggle malicious SQL dataset. The goal of the genetic algorithm is to enhance the evasiveness and sophistication of the original malicious queries.

The full research paper outlining the details of the dataset and its underlying principles:

“An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation”, Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC, USA

1. Source Code Authorship Attribution (YU-SCAA-2022)

Source Code Authorship Attribution (SCAA) is the technique to find the real author of source code in a corpus. Though it is a privacy threat to open-source programmers, it has shown to be significantly helpful in developing forensic-based applications such as ghostwriting detection, copyright dispute settlements, catching authors of malicious applications using source code, and other code analysis applications. This dataset was created by extracting ’code’ data from the GCJ, and GitHub datasets, including examples of attacks and adversarial examples, were created using Source Code Imitator. The dataset has a total of 1,632 code files from 204 authors.

The full research paper outlining the details of the dataset and its underlying principles:

”AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework”, Abhishek Chopra , Nikhill Vombatkere , Arash Habibi Lashkari, The 12th International Conference on Communication and Network Security (ICCNS), 2022, China

Download Dataset:

Who has made use of our cybersecurity datasets (since September 2023)?

A

  • Abudhabi University, United Arab Emirates 
  • Ain Shams University, Egypt 
  • Air University, Pakistan  
  • Aliah University, India 
  • Aalim muhammed salegh college of engineering, India
  • Amazon, India  
  • Amity University Rajasthan, India
  • Amrita Vishwa Vidyapeetham University, India 
  • American University in the Emirates, United Arab Emirates 
  • American University of Sharjah, United Arab Emirates 
  • Australian Department of Defence, Australia 

B

  • Banaras Hindu University, India
  • Beijing Jiaotong University, China 
  • Birmingham City University, England  
  • Birkbeck University of London, England
  • BlueLotus, Columbia
  • BlueLotus, Turkey
  • Bozorgmehr University, Iran 

C

  • Christ Academy Institute for Advanced Studies (CAIAS), India 
  • Catholic University of the Sacred Heart, Italy 
  • Central South University, China 
  • Christ Academy College for Advanced Studies, India 
  • Cisco Systems Inc, USA 
  • Cochin University of Science and Technology, India  
  • CodePath, USA 
  • COEP Technological University, India  
  • Consultant, UK 
  • cPacket, USA  
  • CQVista Inc., South Korea 
  • CUAB, Nigeria 
  • Cyber, Belgium 
  • Cyber Silo Inc., USA  

D

  • Dalhousie University, Canada  
  • Dalian Jiaotong University, China 
  • Deakin University, Australia 
  • Delhi Technological University, India 
  • Dr. Shariati Technical and Vocational College, Iran 

E

  • East China Normal University, China  
  • Eastern Institute of Technology, New Zealand 
  • Erlangen University, Germany 
  • Equinix, USA 

F

  • Fachhochschule der Wirtschaft, Germany 
  • Feng Chia University, Taiwan 
  • FHDW Paderborn, Germany 
  • Fuzhou University, China  

G

  • General Assembly, Bahrain 
  • George Washington University, USA
  • Ghent University, IDLab-Imec, Belgium 
  • Graphic Deemed University, India 
  • Guru Govind Singh University, India 

H

  • Hohai University, China  
  • Holy Angel University, Philippines 
  • HUST, Vietnam 

I

  • Institute for Advanced Study (IAS), USA 
  • IIT BHU, India
  • Illinois Institute of Technology, USA 
  • Indian Institute of Technology (BHU) Varanasi, India 
  • IMP Group International, Canada
  • Institute of Technology of Cambodia, Cambodia  
  • Islamic Azad University, Iran 
  • Istanbul Technical University, Türkiye 

J

  • Jiangsu University, China 
  • Jinan University, China
  • John Jay College, USA
  • JNU, China 

K

  • Kadir Has University, Türkiye
  • Kent State University, USA
  • KMUTNB, Thailand 
  • KNUST, Ghana
  • Kookmin University, South Korea 

L

  • La Salle University – Ramon Llull, Spain 
  • Load Go Transport Inc., Canada 

M

  • Madurai Kamaraj University, India 
  • Malaviya National Institute of Technology Jaipur (MNIT), India 
  • Makerere University, Uganda
  • Maven Technical, Nigeria
  • Medcare MSO, Pakistan
  • Misr International University, Egypt
  • Mumbai University, India  

N

  • Namal University Mianwali, Pakistan  
  • Nanjing Tech, China  
  • Nanjing University of Science and Technology (NJUST), China  
  • Nanjing University, China  
  • National Centre For Cyber Security – UET Peshawar (NCCS-UETP), Pakistan
  • National Forensic Sciences University (NFSU), India  
  • National Forensic Sciences University, India  
  • National Institute of Technology Karnataka(NITK), India  
  • National Institute of Technology(NIT), India  
  • National Sun Yat-sen University, Taiwan  
  • National Taiwan University of Science and Technology, Taiwan  
  • National Taiwan University, Taiwan
  • National Technological University of South Lima, Peru
  • National University of Defense Technology, China 
  • National University of Technology (NUTECH), Pakistan  
  • New Mansoura University, Egypt  
  • NIELIT Calicut, India  
  • Nile University, Egypt 
  • Nirma University, India 
  • North Carolina State University, USA
  • Northeastern University, USA
  • NUST School of Electrical Engineering and Computer Science (NUST-SEECS), Pakistan  

O

P

  • Pabna University of Science and Technology, Bangladesh  
  • Parahyangan catholic university, Indonesia  
  • Polytechnic Institute of Leiria (IPLeiria), Portugal 
  • Premier University, Bangladesh  
  • Princess Nourah Bint Abdul Rahman University, Saudi Arabia  
  • Prince Sattam Bin Abdulaziz University, Saudi Arabia 
  • PSG College of Technology, India 
  • PSL Research University, France  
  • Pusan National University (PNU), South Korea 

Q

R

  • Reva University, India    
  • Rice University, USA 
  • Rochester Institute of Technology, USA
  • RUDRA Cybersecurity, India 

S

  • S.E.A Protection Services, Canada  
  • Sacred Heart University (SHU), USA  
  • Sardar Patel Institute of Technology, India  
  • São Paulo State University, Brazil 
  • SecureITlab, Bahrain  
  • Selçuk Üniversitesi, Turkey  
  • Seneca College, Canada  
  • Shahid Beheshti University, Iran 
  • Shandong University, China  
  • Siberian Federal University, Siberia  
  • Singapore Management University (SMU), Singapore   
  • South China University of Technology, China 
  • Southeast University, China 
  • Sri Krishna Arts and Science College, India  
  • Sri Ramaswamy Memorial Institute of Science and Technology (SRM), India
  • Sri Sivasubramaniya Nadar College of Engineering, India  
  • Srinivas University, India  
  • SRM Institute of Science and Technology, India  
  • Stanford University, USA 
  • State Polytechnic of Ujung Pandang, Indonesia  
  • Swe, England  
  • Szkoła Główna Gospodarstwa Wiejskiego w Warszawie, Poland 

T

  • Taibah University, Saudi Arabia  
  • Technical and Vocational University. Shariaty Technical College, Iran  
  • Technological University of Panama, Panama  
  • Telkom University, Indonesia  
  • Third Sarl., Cameroon  
  • Tianjin University of Technology, China  
  • Tishreen University, Syria 
  • Todyl Inc, USA 
  • Tongji University, China   
  • Tshimologong Precinct, Technology Park in South Africa  
  • Tsinghua University, China  
  • TU Wien, Austria 

U

  • UCAS, Bangladesh
  • UCL, USA
  • Ulster University, United Kingdom
  • UNB (Canadian Institute For Cybersecurity), Canada  
  • UiTM, Malaysia
  • UNED, Spain
  • Unesp – São Paulo State University, Brazil
  • Unisinos, Brazil
  • United Commercial Bank PLC, Bangladesh 
  • Universidad Popular Autónoma del Estado de Puebla (UPAEP), Mexico 
  • UNIVERSITAS SILIWANGI, Indonecia
  • Université de Sherbrooke, Canada 
  • Universiti Tenaga Nasional Malaysia, Malaysia  
  • Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia 
  • University College Dublin, Ireland  
  • University Mohammed 5 Rabat, Morocco  
  • University of Cadiz, Spain
  • University of Calgary, Canada  
  • University of California San Diego, USA  
  • University of Calabria, Italy 
  • University of Campania, Italy  
  • University of Caxias do Sul, Brazil  
  • University of Chinese Academy of Sciences (UCAS), China  
  • University of Chinese Academy of Sciences, China 
  • University of Colombo, Colombia
  • University of Delhi, India  
  • University of Dodoma, Tanzania
  • University of East London, UK 
  • University of Electronic Science and Technology of China, China 
  • University of Engineering & Applied Sciences (Swat), Pakistan 
  • University of Engineering and Technology (UET), Taxila, Pakistan 
  • University of Exeter, United Kingdom
  • University of Guelph, Canada 
  • University of Houston, USA
  • University of Jaén, Spain
  • University of Kashmir, Iraq
  • University of Kashmir, Pakistan
  • University of Kelaniya, Sri Lanka
  • University of Kufa, Iraq
  • University of Malta, Malta
  • University of New Mexico (UNM), Mexico
  • University of New Mexico, USA
  • University of Reading, England  
  • University of Riau, Indonesia 
  • University of São Paulo, Brazil
  • University of Science and Technology Chittagong, Bangladesh 
  • University of Toronto, Canada
  • University of Waikato, New Zealand
  • University Of Waterloo, Canada
  • University of Zürich, Switzerland
  • UNOB, Slovakia 
  • UNOC, Czech Republic 
  • UNSW Sydney, Australia
  • USM, Malaysia 

V

  • Vellore Institute of Technology (VIT), India
  • Viavi Solutions, USA   

W

  • Wayne State University, USA
  • Westpac, Australia 
  • WHU  
  • Wrocław University of Science and Technology, Poland
  • Wuhan university, China  

X

 Xi’an University of Technology, China  

Y

York University, Canada 

Z

Zhejiang University, China