Datasets
Standard Dataset
DDOS Attack Logs
- Citation Author(s):
- Submitted by:
- Cornelius Itodo
- Last updated:
- Wed, 04/24/2024 - 08:05
- DOI:
- 10.21227/421e-0b70
- Data Format:
- Research Article Link:
- Links:
- License:
- Categories:
- Keywords:
Abstract
The sudden shift from physical office location to a fully remote or hybrid work model accelerated by the COVID-19 pandemic is a phenomenon that changed how organizations traditionally operated and thereby introduced new vulnerabilities and consequently changed the cyber threat landscape. This has led organizations around the globe to seek new approaches to protect their enterprise network. One such approach is the adoption of the Zero Trust security approach due to its many advantages over the traditional/perimeter security approach. Although zero trust presents a stronger defense approach over the perimeter security model, organizations are hesitant to fully embrace it. This is partly due to the lack of a unified zero-trust implementation framework that can be used to guide its adoption. As such, we conducted a multivocal review that included literature from both academic and non-academic sources to consolidate knowledge on the state-of-the-art of zero-trust implementation and identify gaps in literature. Our result shows that existing papers tend to have a narrow viewpoint on the approach of implementing zero trust, rather than an encompassing viewpoint that can provide a more holistic view on the topic. We developed a conceptual framework that articulates the five core components involved in the implementation of zero trust security, guided by key questions designed to guide the implementation process.
The Readme files describe Logs generated by Fortigate Firewall for DDoS Attacks and Wazuh Logs for Insider Threat Attack (Privilege abuse)
Dataset Files
- Before DDOS(1).rar (289.87 kB)
- During DDOS(1).rar (1.49 MB)
- Post Enable DDOS Policy.rar (231.87 kB)
- Principle of Least Privilege.7z (61.69 kB)
Documentation
Attachment | Size |
---|---|
Firewall-Logs-Before-DDoS | 82.82 KB |
Firewall-Logs-During-DDoS | 82.65 KB |
Firewall-Logs-Post-DDoS | 88.1 KB |
Readme-WazuhLogs-Insiderthreat-PoLP | 64.4 KB |
Comments
Kindly issue a real world dataset for my research purposes
hi