OT-ICS attacks dataset
Data and Resources
-
normal_scan_features.csvCSV
Normal traffic
-
attack_scan_features.csvCSV
Active scanning involves actively probing a network to discover systems,...
-
Log4Shell vulnerability discoveryCSV
An attacker uses a scanner to detect the presence of the Log4Shell...
-
Exploit Log4Shell vulnerability CSV
The goal of this step is for the attacker to gain initial access to the...
-
Lateral mouvement CSV
Once inside the vulnerable web server machine, the attacker's goal is to move...
-
C&C CSV
The attacker uses the MODBUS/TCP protocol, which typically operates on port...
-
OT-ICS-attacks.zipZIP
Additional Info
| Field | Value |
|---|---|
| Source | https://github.com/montimage-projects/OT-ICS-attacks |
| Author | Montimage |
| Maintainer | Montimage |
| Last Updated | مارس 31, 2026, 12:28 (UTC) |
| Created | سپتامبر 10, 2025, 11:36 (UTC) |
| attack_stages | reconnaissance; exploitation; lateral movement; command and control |
| domain | OT/ICS |
| protocols_or_systems | MODBUS/TCP; OpenPLC; ScadaBR; Tomcat |