MQTT-IoT-IDS2020: MQTT Internet of Things Intrusion Detection Dataset

Citation Author(s):
Abertay University
University of Strathclyde
University of Strathclyde
Abertay University
University of Strathclyde
Submitted by:
Hanan Hindy
Last updated:
Mon, 08/31/2020 - 12:43
Data Format:
3 ratings - Please login to submit your rating.


Message Queuing Telemetry Transport (MQTT) protocol is one of the most used standards used in Internet of Things (IoT) machine to machine communication. The increase in the number of available IoT devices and used protocols reinforce the need for new and robust Intrusion Detection Systems (IDS). However, building IoT IDS requires the availability of datasets to process, train and evaluate these models. The dataset presented in this paper is the first to simulate an MQTT-based network. The dataset is generated using a simulated MQTT network architecture. The network comprises twelve sensors, a broker, a simulated camera, and an attacker. Five scenarios are recorded: (1) normal operation, (2) aggressive scan, (3) UDP scan, (4) Sparta SSH brute-force, and (5) MQTT brute-force attack.  The raw pcap files are saved, then features are extracted. Three abstraction levels of features are extracted from the raw pcap files: (a) packet features, (b) Unidirectional flow features and (c) Bidirectional flow features. The csv feature files in the dataset are suited for Machine Learning (ML) usage. Also, the raw pcap files are suitable for the deeper analysis of MQTT IoT networks communication and the associated attacks. 


The dataset consists of 5 pcap files, namely, normal.pcap, sparta.pcap, scan_A.pcap, mqtt_bruteforce.pcap and scan_sU.pcap. Each file represents a recording of one scenario; normal operation, Sparta SSH brute-force, aggressive scan, MQTT brute-force and UDP scan respectively. The attack pcap files contain background normal operations. The attacker IP address is “”. Basic packet features are extracted from the pcap files into CSV files with the same pcap file names. The features include flags, length, MQTT message parameters, etc. Later, unidirectional and bidirectional features are extracted.  It is important to note that for the bidirectional flows, some features (pointed as *) have two values—one for forward flow and one for the backward flow. The two features are recorded and distinguished by a prefix “fwd_” for forward and “bwd_” for backward. 



really very interesting, thank very much

Submitted by Randi Rizal on Sat, 10/31/2020 - 04:16

Great work!
Thank you very much for sharing.

Submitted by kahraman kostas on Wed, 01/13/2021 - 11:09

how i can download csv file of MQTT dataset?

Submitted by Khizra Arooj on Wed, 01/27/2021 - 10:13

Please find the on the same page, it contains CSV files.

Submitted by Muhammad Khan on Wed, 03/10/2021 - 01:41

how i can download csv file of MQTT dataset?

Submitted by Khizra Arooj on Wed, 01/27/2021 - 10:13