Back to datasets
Dataset assetOpen Source CommunityUAV SafetyNetwork Attacks
Cyber-Physical Dataset for UAVs Under Normal Operations and Cyberattacks
The dataset contains network and physical data of unmanned aerial vehicles (UAVs) under normal operation and under cyber‑attack conditions. It includes four types of network attacks: de‑authentication denial‑of‑service, replay attack, false data injection, and evil twin attack. The dataset is divided into benign data and data for each attack type, with detailed records of network and physical features for each scenario.
Source
github
Created
Feb 2, 2024
Updated
Feb 3, 2024
Signals
310 views
Availability
Linked source ready
Overview
Dataset description and usage context
Dataset Overview
Dataset Name
- Cyber‑Physical Dataset for UAVs Under Normal Operations and Cyberattacks
Dataset Content
- File Type: CSV files
- Data Types:
- Physical Data: 16 features
- Network Data: 37 features
- Attack Types:
- De‑authentication Denial‑of‑Service (DoS) Attacks
- Replay Attacks
- False Data Injection (FDI) Attacks
- Evil Twin Attacks
Dataset Structure
- Benign Data: Cyber: 1–9426 | Physical: 9427–13717
- DoS Attack Data: Cyber: 13718–25389 | Physical: 25390–26363
- Replay Attack Data: Cyber: 26364–38370 | Physical: 38371–39344
- Evil Twin Attack Data: Cyber: 39345–45028 | Physical: 45029–50502
- FDI Attack Data: Cyber: 50503–53976 | Physical: 53977–54784
Dataset Usage
- Intended for developing and testing UAV intrusion detection systems, especially for analysis under normal operation and cyber‑attack conditions.
Dataset Citation
- Users are encouraged to cite the related paper when using this dataset: Cyber‑Physical Intrusion Detection System for Unmanned Aerial Vehicles.
Need downstream help?
Pair the dataset with AI analysis and content workflows.
Once the source passes your review, move straight into summarization, transformation, report drafting, or presentation generation with the JuheAI toolchain.