Serial Number: 63
Year: 2018
Kind of Traffic: Real
Publicly Available:
Count of Records: 24.2MB
Features Count: 32
No. of citations: 11
Attack Type: DoS, MITM, etc
Download Links: https://ieee-dataport.org/open-access/m2m-using-opc-ua
Abstract: Pinto presented dataset OPCUA. The dataset captures OPC UA traffic generated within a laboratory CPPS testbed, where OPC UA standard facilitates both horizontal and vertical communications. The testbed comprises seven nodes, each housing a Raspberry Pi device running the Python FreeOpcUa implementation. Two production units, each with three devices, and a Manufacturing Execution System (MES) node form the network. Devices function as both OPC UA servers, publishing sensor data updates, and clients, subscribing to updates from other devices. The MES serves solely as an OPC UA client, subscribing to all variables from all devices. An additional attack node, representing a potential threat, is integrated into the network. Tshark captures OPC UA packets, exporting the traffic to a CSV dataset, encompassing normal and anomalous behaviors. Anomalous behavior, introduced by the malicious node, includes attacks like Denial of Service (DoS), Eavesdropping (MITM), and Impersonation (Spoofing) targeting device nodes and the MES.