Security

Over 34,000 frames from 60 commercial-off-the-shelf ZigBee devices were collected in various scenarios including indoor/outdoor and line-of-sight/non-line-of-sight (LOS/NLOS). The ZigBee devices are hybrid, with 36 equipped with power amplifiers and the other 24 not. The ZigBee device uses the CC2530 chip, while the power amplifier is the RFX2401C chip. The signal frames in each scenario are placed in a separate folder, where all device numbers are fixed. Each frame reaches its maximum length, which includes 266 symbols.

Categories:
664 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
4496 Views

Translator   Translator   Translator   

Categories:
181 Views

In order to analyze the status of web domain certificates in the Web PKI, a relevant set of X.509 certificates must be built. This dataset was created based on the Alexa Top 1 Million (Top1M) List (available on 26 August 2021) and the Majestic Top 1 Million List (available on 21 November 2022) containing the most visited websites. We collected the X.509 certificates for the web domains in the Alexa Top1M list (file "ListAlexaFinal.txt") with two dedicated scripts in the dataset, namely "ScriptCollectCertificates.sh" and "StartScript_CollectCertificates.sh".

Categories:
239 Views

Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel’s coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implement the full SKG chain in four indoor experimental campaigns.

Categories:
482 Views

The high profitability of mining cryptocurrencies mining, a computationally intensive activity, forms a fertile ecosystem that is enticing not only legitimate investors but also cyber attackers who invest their illicit computational resources in this area. Cryptojacking refers to the surreptitious exploitation of a victim’s computing resources to mine cryptocurrencies on behalf of the cybercriminal. This malicious behavior is observed in executable files and browser executable codes, including JavaScript and Assembly modules, downloaded from websites to victims’ machines and executed.

Categories:
387 Views

Dataset I: This is the original EEG data of twelve healthy subjects for driver fatigue detection. Due to personal privacy, the digital number represents different participants. The .cnt files were created by a 40-channel Neuroscan amplifier, including the EEG data in two states in the process of driving.

Dataset II: This project adopted an event-related lane-departure paradigm in a virtual-reality (VR) dynamic driving simulator to quantitatively measure brain EEG dynamics along with the fluctuation of task performance throughout the experiment.

Categories:
2932 Views

The advancements in the field of telecommunications have resulted in an increasing demand for robust, high-speed, and secure connections between User Equipment (UE) instances and the Data Network (DN). The implementation of the newly defined 3rd Generation Partnership Project 3GPP (3GPP) network architecture in the 5G Core (5GC) represents a significant leap towards fulfilling these demands. This architecture promises faster connectivity, low latency, higher data transfer rates, and improved network reliability.

Categories:
3838 Views

It is a real IoT traffic.

 

Categories:
81 Views

User's Behvoiur Scores with cyber attack victim as label

Categories:
377 Views

Pages