OT-ICS attacks dataset
Data and Resources
-
normal_scan_features.csvCSV
Normal traffic
-
attack_scan_features.csvCSV
Active scanning involves actively probing a network to discover systems,...
-
Log4Shell vulnerability discoveryCSV
An attacker uses a scanner to detect the presence of the Log4Shell...
-
Exploit Log4Shell vulnerability CSV
The goal of this step is for the attacker to gain initial access to the...
-
Lateral mouvement CSV
Once inside the vulnerable web server machine, the attacker's goal is to move...
-
C&C CSV
The attacker uses the MODBUS/TCP protocol, which typically operates on port...
Additional Info
| Field | Value |
|---|---|
| Source | https://github.com/montimage-projects/OT-ICS-attacks |
| Author | Montimage |
| Maintainer | Montimage |
| Last Updated | September 10, 2025, 11:44 (UTC) |
| Created | September 10, 2025, 11:36 (UTC) |