Cybersecurity

The security testing focuses on evaluating the security of the web, mobile, networks, API, SaaS, blockchain & cloud applications by methodically validating & verifying the effectiveness of security controls. The process involves an active analysis of any application for any available weaknesses, technical flaws, or vulnerabilities.

 

The security audit scope of work will include:

Categories:
449 Views

The IEEE 24 bus system is modelled in Digsilent’s Power factory, and normal operating data points are generated under quasi dynamic simulation and N-2 contingencies.  An optimization problem to generate false data injection attack vectors are then modelled using MATLAB. This data contains normal, contingency and attack data points for the necessary variables in a power network. The attack data has 5 parts, with each part generated by a different type of attack.

Categories:
1525 Views

This dataset is composed of side channel information (e.g., temperatures, voltages, utilization rates) from computing systems executing benign and malicious code.  The intent of the dataset is to allow aritificial intelligence tools to be applied to malware detection using side channel information.

Categories:
1015 Views

The dataset contains:
1. We conducted a A 24-hour recording of ADS-B signals at DAB on 1090 MHz with USRP B210 (8 MHz sample rate). In total, we got the signals from more than 130 aircraft.
2. An enhanced gr-adsb, in which each message's digital baseband (I/Q) signals and metadata (flight information) are recorded simultaneously. The output file path can be specified in the property panel of the ADS-B decoder submodule.
3. Our GnuRadio flow for signal reception.
4. Matlab code of the paper, wireless device identification using the zero-bias neural network.

Categories:
3906 Views

Presented here is a dataset used for our SCADA cybersecurity research. The dataset was built using our SCADA system testbed described in our paper below [*]. The purpose of our testbed was to emulate real-world industrial systems closely. It allowed us to carry out realistic cyber-attacks.

 

Categories:
2452 Views

We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.

* The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.

Categories:
42374 Views

Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

Categories:
262 Views

This Data provides a report on the number of Cyberattacks received by Zapaat Search Engine - the server being hosted in India. A list of offending IP addresses is also provided.

Categories:
639 Views

Pages