Anomaly Detection

This unlabeled dataset reflects the network activity of a real branch office with 29 active machines connected to the same broadcast domain for four hours. To achieve this, a Network Intrusion Detection System (NIDS) called BCAST IDS listened to network traffic every 10 seconds. During this time, various types of activities were carried out (browsing, emailing, file transfers, etc.) on each machine to ensure the dataset reflected a wide range of benign behavior.

Categories:
132 Views

As the world increasingly becomes more interconnected, the demand for safety and security is ever-increasing, particularly for industrial networks. This has prompted numerous researchers to investigate different methodologies and techniques suitable for intrusion detection systems (IDS) requirements. Over the years, many studies have proposed various solutions in this regard, including signature-based and machine learning (ML)-based systems. More recently, researchers are considering deep learning (DL)-based anomaly detection approaches.

Categories:
159 Views

Anomaly detection in Phasor Measurement Unit (PMU) data requires high-quality, realistic labeled datasets for algorithm training and validation. Obtaining real field labelled data is challenging due to privacy, security concerns, and the rarity of certain anomalies, making a robust testbed indispensable. This paper presents the development and implementation of a Hardware-in-the-Loop (HIL) Synchrophasor Testbed designed for realistic data generation for testing and validating PMU anomaly detection algorithms.

Categories:
856 Views

The detection of anomalous structures in natural image data is of utmost importance for numerous tasks in the field of computer vision. The development of methods for unsupervised anomaly detection requires data on which to train and evaluate new approaches and ideas. We introduce the MVTec Anomaly Detection (MVTec AD) dataset containing 5354 high-resolution color images of different object and texture categories. It contains normal, i.e., defect-free, images intended for training and images with anomalies intended for testing.

Categories:
159 Views

Anomaly detection plays a crucial role in various domains, including but not limited to cybersecurity, space science, finance, and healthcare. However, the lack of standardized benchmark datasets hinders the comparative evaluation of anomaly detection algorithms. In this work, we address this gap by presenting a curated collection of preprocessed datasets for spacecraft anomalies sourced from multiple sources. These datasets cover a diverse range of anomalies and real-world scenarios for the spacecrafts.

Categories:
733 Views

Smart grids are nowadays featured by distributed energy resources, both renewables, traditional sources and storage systems. Generally, these components are characterized by different control technologies that interact with the generators through smart inverters. This exposes them to a variety of cyber threats. In this context, there is a need to develop datasets of attacks on these systems, in order to evaluate the risks and allow researchers to develop proper monitoring algorithms.

Categories:
540 Views

This article presents a dataset collected from a real process control network (PCN) to facilitate deep-learning-based anomaly detection and analysis in industrial settings. The dataset aims to provide a realistic environment for researchers to develop, test, and benchmark anomaly detection models without the risk associated with experimenting on live systems. It reflects raw process data from a gas processing plant, offering coverage of critical parameters vital for system performance, safety, and process optimization.

Categories:
825 Views

In the context of the FLAMENCO project, we have released a dataset designed for predicting potential deficiencies in children's communication skills, tailored for Federated Learning. This dataset specifically focuses on addressing two prevalent deficiencies in communication skill development in children: autism and intellectual disability. For each deficiency, two CSV files are provided—one for training machine learning models and another for testing them. Each entry in these CSV files includes the following details:

 

Categories:
645 Views

In the contemporary cybersecurity landscape, robust attack detection mechanisms are important for organizations. However, the current state of research in Software-Defined Networking (SDN) suffers from a notable lack of recent SDN-OpenFlow-based datasets. Here we introduce a novel dataset for intrusion detection in Software-Defined Networking named SDNFlow. The dataset, derived from OpenFlow statistics gathered from real traffic, integrates a comprehensive range of network activities.

Categories:
1143 Views

# Datasets for stage 3

The datasets were collected from a software-based simulation environment simulating a small-scale IEC 61850-compliant substation with both the primary plant and the process bus.

The datasets consist of 148 attack scenarios, each scenario includes two benign behaviours (fault-free behaviours and emergency behaviours) and one type of malicious behaviour. 

Categories:
44 Views

Pages