Security

Boğaziçi University DDoS dataset (BOUN DDoS) is generated in Boğaziçi University via Hping3 traffic generator software by flooding TCP SYN, and UDP packets. This dataset includes attack-free user traffic as well as attack traffic and suitable for evaluating network-based DDoS detection methods. Attacks are towards one victim server connected to the backbone router of the campus.  Attack packets have randomly generated spoofed source  IP addresses.  The data-trace was recorded on the backbone and included over 2000 active hosts. The average packet/second ratio was around 18000. 

25 views
  • Security
  • Last Updated On: 
    Wed, 10/09/2019 - 10:07

    We created various types of network attacks in Internet of Things (IoT) environment for academic purpose. Two typical smart home devices -- SKT NUGU (NU 100) and EZVIZ Wi-Fi Camera (C2C Mini O Plus 1080P) -- were used. All devices, including some laptops or smart phones, were connected to the same wireless network. The dataset consists of 42 raw network packet files (pcap) at different time points.

    * The packet files are captured by using monitor mode of wireless network adapter. The wireless headers are removed by Aircrack-ng.

    357 views
  • Security
  • Last Updated On: 
    Fri, 09/27/2019 - 04:57

    This dataset contains Cyber Threat Intelligence (CTI) data generated from public security reports and malware repositories.

    The dataset is stored in a structured format (JSON) and includes approximately 640,000 records from 612 security reports published from January 2008 to June 2019.

    Several data types are contained in this dataset such as URL, host, IP address, e-mail account, hashes (MD5, SHA1, and SHA256), common vulnerabilities and exposures (CVE), registry, file names ending with specific extensions, and the program database (PDB) path.

    194 views
  • Security
  • Last Updated On: 
    Sun, 10/06/2019 - 07:02

    This FFT-75 dataset contains randomly sampled, potentially overlapping file fragments from 75 popular file types (see details below). It is the most diverse and balanced dataset available to the best of our knowledge. The dataset is labeled with class IDs and is ready for training supervised machine learning models. We distinguish 6 different scenarios with different granularity and provide variants with 512 and 4096-byte blocks. In each case, we sampled a balanced dataset and split the data as follows: 80% for training, 10% for testing and 10% for validation.

    152 views
  • Security
  • Last Updated On: 
    Wed, 08/07/2019 - 16:56

    This dataset contains the library call lists obtained from programs implemented by using libiec61850. Call lists are marked either as benign, or according to the name of the attack.

    64 views
  • Smart Grid
  • Last Updated On: 
    Mon, 06/17/2019 - 14:13

    This dataset details the state machine based experiments of PowerWatch.

    103 views
  • Smart Grid
  • Last Updated On: 
    Mon, 06/17/2019 - 14:14

    Modern technologies have made the capture and sharing of digital video commonplace; the combination of modern smartphones, cloud storage, and social media platforms have enabled video to become a primary source of information for many people and institutions. As a result, it is important to be able to verify the authenticity and source of this information, including identifying the source camera model that captured it. While a variety of forensic techniques have been developed for digital images, less research has been conducted towards the forensic analysis of videos.

    151 views
  • Digital signal processing
  • Last Updated On: 
    Fri, 06/07/2019 - 15:53

    Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.

    285 views
  • Security
  • Last Updated On: 
    Wed, 09/11/2019 - 03:09

    Data for the article in the Transactions on Industrial Informatics

    108 views
  • Standards Research Data
  • Last Updated On: 
    Thu, 02/28/2019 - 12:16

    The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data crawling, which is for a better simulation of a real detection environment.

    509 views
  • Signal Processing
  • Last Updated On: 
    Sun, 05/12/2019 - 05:15

    Pages