Cyberattack Trends Analysis Dataset
Synthetic Data Generation
Tags and Keywords
Trusted By




"No reviews yet"
Free
About
This dataset tracks global cybersecurity incidents, attack vectors, and threats from 2015 to 2024 [1]. It is designed for in-depth threat intelligence analysis, forecasting cybersecurity trends, and developing machine learning models to enhance global digital security measures [1]. The data provides a detailed view of cyberattacks, including types of malware, industries targeted, and countries affected [1].
Columns
- Country: The nation where the cyberattack took place [2].
- Year: The calendar year of the incident [2].
- Threat Type: The specific type of cybersecurity threat encountered (e.g., Malware, Distributed Denial of Service (DDoS)) [2].
- Attack Vector: The method used for the attack (e.g., Phishing, SQL Injection) [2].
- Affected Industry: The sector or industry that was targeted (e.g., Finance, Healthcare, IT, Banking) [2, 3].
- Data Breached (GB): The estimated volume of data compromised in gigabytes [2].
- Financial Impact ($M): The estimated financial loss resulting from the incident, presented in millions of US dollars [2, 3].
- Severity Level: The classified level of impact of the attack (e.g., Low, Medium, High, Critical) [2].
- Response Time (Hours): The duration, in hours, taken to mitigate the attack [2].
- Mitigation Strategy: The countermeasures or actions taken to address the cyber incident [2].
- Number of Affected Users: The count of individuals impacted by the attack [4].
- Attack Source: The origin of the attack (e.g., Nation-State, Hacktivist, Unknown) [5].
- Security Vulnerability Type: The specific type of vulnerability exploited (e.g., Zero-Day, Social Engineering, SQL Injection) [5].
- Defense Mechanism Used: The cybersecurity defence strategy applied during the incident (e.g., Firewall, Intrusion Detection System (IDS), Antivirus, VPN) [6].
- Incident Resolution Time (in Hours): The total time, in hours, required to fully resolve the incident [6].
Distribution
The dataset is provided in CSV format [7, 8]. It contains 3,000 records across various attributes [3-6, 8, 9]. The file size is approximately 251.28 kB [8].
Usage
This dataset is ideal for:
- Threat intelligence analysis: Gaining insights into evolving cyber threats [1].
- Cybersecurity trend forecasting: Predicting future patterns and shifts in cyberattack landscapes [1].
- Machine learning model development: Building and training models to enhance global digital security [1].
- Academic research: Studying the dynamics of cyber incidents over time.
- Policy making: Informing decisions related to cybersecurity regulations and defence strategies.
Coverage
The dataset covers global cybersecurity threats from 2015 to 2024 [1]. It includes incidents across a variety of countries and industries, offering a broad geographical and sectoral scope [3, 8]. Data points are available for each year within the specified range [9].
License
CC0: Public Domain
Who Can Use It
- Cybersecurity Analysts: For understanding incident patterns and developing defence strategies.
- Data Scientists: For building predictive models and statistical analyses related to cyberattacks.
- Researchers: For academic studies on digital security, threat evolution, and incident response.
- IT Security Professionals: For informing operational security practices and risk assessment.
- Policy Makers: For developing effective cybersecurity policies and regulations.
Dataset Name Suggestions
- Global Cyber Incident Log 2015-2024
- Worldwide Digital Threat Data
- Cyberattack Trends Analysis Dataset
- International Cybersecurity Incidents Database
- Security Breach Statistics (2015-2024)
Attributes
Original Data Source: Cyberattack Trends Analysis Dataset