Skip to main content

Datasets

Standard Dataset

Cyber-Physical Dataset for UAVs Under Normal Operations and Cyber-Attacks

Citation Author(s):
Samuel Hassler
Umair Mughal
Muhammad Ismail
Submitted by:
Muhammad Ismail
Last updated:
DOI:
10.21227/6f22-py65
Data Format:
Research Article Link:
Links:
No Ratings Yet

Abstract

Unmanned aerial vehicles (UAVs) are being used for various applications, but the associated cyber risks are also increasing. Machine learning techniques have been successfully adopted to develop intrusion detection systems (IDSs). However, none of the existing works published the cyber or physical datasets that have been used to develop the IDS, which hinders further research in this field. Hence, we developed a testbed that includes a UAV, controller, and data collection tools, to launch cyber-attacks (de-authentication denial-of-service (DoS), replay, false data injection, and evil twin attacks) on the UAV and collect cyber and physical data under normal and attack conditions, and we make this dataset publicly available.

Instructions:

  • One CSV file is uploaded including normal flights of UAVs and UAV flights subject to cyber-attacks. 
  • The Physical dataset includes sixteen features and the Cyber dataset includes thirty-seven features. Details about these features are found in our publication.
  • Four cyber-attacks are considered in this dataset, namely, de-authentication denial-of-service attacks, replay attacks, false data injection attacks, and evil twin attacks. 
  • Details about the testbed equipment are found in our publication.  
Funding Agency
NSF
Grant Number
2220346
The dataset is uploaded. It has been upgraded to include four cyberattacks and benign data. It has cyber and physical features. The publication detailing the testbed and the experiments will appear soon in IEEE Xplore. If you cannot access the publication, please email me and I will share it with you.
Muhammad Ismail Mon, 12/04/2023 - 01:40 Permalink

no timestamp in Pyhsical FDl Attack, How can you connect it to cyber dataset as you describe in paper?

Qianli Di Sun, 07/07/2024 - 09:06 Permalink