Datasets
Standard Dataset
FDI attacks on Sampled Values
- Citation Author(s):
- Submitted by:
- Xuelei Wang
- Last updated:
- Mon, 07/08/2024 - 15:58
- DOI:
- 10.21227/9x9q-pd59
- Data Format:
- License:
- Categories:
- Keywords:
Abstract
# Datasets for stage 3
The datasets were collected from a software-based simulation environment simulating a small-scale IEC 61850-compliant substation with both the primary plant and the process bus.
The datasets consist of 148 attack scenarios, each scenario includes two benign behaviours (fault-free behaviours and emergency behaviours) and one type of malicious behaviour.
All attack scenarios are derived from two types of false data injection attacks (FDIAs): 1) modification of data in the original message, and 2) addition of fake messages. Different attack configurations were applied to generate a variety of datasets, such as injecting or modifying different numbers of packets, injecting packets in different frequencies, and slightly increasing original measurements with certain ratios.
**The details of each dataset and attack scenario are explained and listed in "Attack Scenario details.xlsx"**
**The location and file name of each scenario or each dataset are demonstrated in "Attack Scenario details.xlsx"**
For example, attack scenario 9432 has one original dataset called **IED_TRSF1_SV.pcapng** and **IED_TRSF1_SV.csv**, one merged dataset called **Data.xlsx**, and two final datasets called **5_2.xlsx** and **6_2.xlsx**, in the location of /943/9432 (Add all 25ms).