This dataset includes both benign traffic and flooding attack traffic, allowing the analysis of normal and malicious behavior under multiple 5G interface conditions. The captures were collected at multiple observation points in the emulated system. Traffic on the N3 interface was recorded at r0 inside the GTP tunnel, traffic on the N6 interface was recorded at r1 after the UPF, and N4 control traffic was captured separately on the Control VM. All packet traces are stored in PCAP format, truncated to a snap length of 96 bytes, and anonymized through MAC address pseudonymization. These design choices make the dataset practical for reproducible experimentation on attack detection, traffic characterization, and comparative analysis of benign and flooding scenarios.