Nowadays, with the rapid increase in the number of applications and networks, the number of cyber multi-step attacks has been increasing exponentially. Thus, the need for a reliable and acceptable Intrusion Detection System (IDS) solution is becoming urgent to protect the networks and devices. However, implementing a robust IDS needs a reliable and up-to-date dataset in order to capture the behaviors of the new types of attacks, especially multi-step attacks. In this work, a new benchmark Multi-Step Cyber-Attack Dataset (MSCAD) is introduced.


An indoor positioning testbed was set up to collect location fingerprint dataset for multi-floor environments and an extensive fingerprint measurement campaign was carried out at the second and third floors of Wing B of the Faculty of Engineering (FOE), Multimedia University, on its campus in Cyberjaya, Malaysia. The total area of the evaluation site is approximately around 1112 m2.


Syslog, SNMP, and tcpdump data for 3 years or more from wireless network at Dartmouth College.

This dataset includes syslog, SNMP, and tcpdump data for 3 years or more, for over 450 access points and several thousand users at Dartmouth College.

Note: This dataset has multiple versions.  The dataset file names of the data associated with this version are listed below, under the 'Traceset' heading and can be downloaded under 'Dataset Files' on the right-hand side of the page.

last modified :


Traces of Bluetooth sightings by groups of users carrying small devices (iMotes) for a number of days.

This data includes a number of traces of Bluetooth sightings by groups of users carrying small devices (iMotes) for a number of days - in office environments, conference environments, and city environments.

All versions of this dataset, oldest to newest: v. 2006-01-31,  v. 2006-09-15,  v. 2009-05-29.

network type: bluetooth


This dataset is used for the identification of video in the internet traffic. The dataset was prepared by using Wireshark. It comprises of two types of traffic data, VPN (Virtual Private Network) or encrypted traffic data and Non-VPN or unencrypted traffic. The dataset consist of the data streams (.pcap) of 43 videos. Each video is played 50 times in both VPN and Non-VPN mode. The streams were obtained by setting-up a dummy client on a PC which plays a YouTube video and Wireshark is used to capture the internet traffic.


Emulating a RT task and measuring the response latency of its thread by means of the high-resolution testing tool Cyclictest. The thread was clocked at 10ms, and a FIFO scheduling policy was used, with the thread being assigned the highest priority. Measurements were performed in distinct testing environments, some of which had best effort concurrent threads competing for the machine resources. For this purpose, the workload generator tool stress was used.


Machine learning methods are poised to drastically improve the performance of many aspects of communication engineering, across all layers of the communication stack: from the physical layer to the application one.  In this competition, we focus on the problem of federated training of a deep CSI compressor for massive MIMO in 5G protocols and beyond.

Last Updated On: 
Mon, 10/24/2022 - 04:43

Network topologies with link parameters; some statistical data.


This dataset contains the raw data of the measurements/simulations presented in "Modulation Scheme Analysis for Low-Power Leadless Pacemaker Synchronization Based on Conductive Intracardiac Communication" by A. Ryser et al. This work analyzed the bit error rate (BER) performance of a prototype dual-chamber leadless pacemaker both in simulation and in-vitro experiments on porcine hearts.


This dataset was created using Wireshark. The dataset contains a total of 30 encrypted communication records, 3 records (.pcap) were created for each application. The records were obtained from a mobile device that was connected to the laptop using wifi technology. The laptop was connected to the Internet and contained a running instance of Wireshark to create a record. The telephone had been restarted before each record was created. After connecting to the network, the device was left without user interaction for 5 minutes.