Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE, "PWNJUTSU dataset", IEEE Dataport, 2022. [Online]. Available: http://dx.doi.org/10.21227/ngjr-kh92. Accessed: Apr. 23, 2025.
@data{ngjr-kh92-22,
doi = {10.21227/ngjr-kh92},
url = {http://dx.doi.org/10.21227/ngjr-kh92},
author = {Aimad BERADY; Mathieu JAUME; Valérie VIET TRIEM TONG; Gilles GUETTE },
publisher = {IEEE Dataport},
title = {PWNJUTSU dataset},
year = {2022} }
TY - DATA
T1 - PWNJUTSU dataset
AU - Aimad BERADY; Mathieu JAUME; Valérie VIET TRIEM TONG; Gilles GUETTE
PY - 2022
PB - IEEE Dataport
UR - 10.21227/ngjr-kh92
ER -
Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE. (2022). PWNJUTSU dataset. IEEE Dataport. http://dx.doi.org/10.21227/ngjr-kh92
Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE, 2022. PWNJUTSU dataset. Available at: http://dx.doi.org/10.21227/ngjr-kh92.
Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE. (2022). "PWNJUTSU dataset." Web.
1. Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE. PWNJUTSU dataset [Internet]. IEEE Dataport; 2022. Available from : http://dx.doi.org/10.21227/ngjr-kh92
Aimad BERADY, Mathieu JAUME, Valérie VIET TRIEM TONG, Gilles GUETTE. "PWNJUTSU dataset." doi: 10.21227/ngjr-kh92