Security

This is a dataset of Tor cell file extracted from browsing simulation using Tor Browser. The simulations cover both desktop and mobile webpages. The data collection process was using WFP-Collector tool (https://github.com/irsyadpage/WFP-Collector). All the neccessary configuration to perform the simulation as detailed in the tool repository.

Categories:
1043 Views

Security patches play a crucial role in the battle

against Open Source Software (OSS) vulnerabilities. Meanwhile,

to facilitate the development of OSS projects, both upstream and

downstream developers often maintain multiple branches. Due

to the different code contexts among branches, multiple security

patch variants exist for the same vulnerability. Hence, to ease the

management of OSS vulnerabilities, locating all patch variants

of an OSS vulnerability is pretty important. However, existing

Categories:
32 Views

Intrusion detection in Unmanned Aerial Vehicle (UAV) networks is crucial for maintaining the security and integrity of autonomous operations. However, the effectiveness of intrusion detection systems (IDS) is often compromised by the scarcity and imbalance of available datasets, which limits the ability to train accurate and reliable machine learning models. To address these challenges, we present the "CTGAN-Enhanced Dataset for UAV Network Intrusion Detection", a meticulously curated and augmented dataset designed to improve the performance of IDS in UAV environments.

 

Categories:
530 Views

This dataset consists of network packet traces collected in 2023 on the 5G infrastructure deployed at Chalmers University of Technology.

The dataset includes 1,912 pcap files, distributed across 8 folders. Each pcap file captures 1 minute of encrypted network traffic generated by one of the following 8 popular mobile applications:

Categories:
245 Views

To provide a standardized approach for testing and benchmarking secure evaluation of transformer-based models, we developed the iDASH24 Homomorphic Encryption track dataset. This dataset is centered on protein sequence classification as the benchmark task. It includes a neural network model with a transformer architecture and a sample dataset, both used to build and evaluate secure evaluation strategies.

Categories:
93 Views

This dataset is derived from the original dataset published by Dongkwan Kim et al. in their paper "Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned."

The main modifications include:

Categories:
20 Views

This unlabeled dataset reflects the network activity of a real branch office with 29 active machines connected to the same broadcast domain for four hours. To achieve this, a Network Intrusion Detection System (NIDS) called BCAST IDS listened to network traffic every 10 seconds. During this time, various types of activities were carried out (browsing, emailing, file transfers, etc.) on each machine to ensure the dataset reflected a wide range of benign behavior.

Categories:
143 Views

This dataset results from a 5-month-long Cloud Telescope Internet Background Radiation collection experiment conducted during the months of October 2023 until February 2024.
A total amount of 130 EC2 instances (sensors) were deployed across all the 26 commercially available AWS regions at the time,  5 sensors per region.
A Cloud Telescope sensor does not serve information. All traffic arriving to the sensor is unsolicited, and potentially malicious. Sensors were configured to allow all unsolicited traffic.

Categories:
360 Views

Our dataset is constructed by leveraging existing malware samples and utilizing both UTRDCL and traditional DCL techniques to load the malicious components, thereby launching attacks. In addition to the malware samples themselves, we also provide online detection reports from reputable sources, including VirusTotal, MobSF, and Bazaar (Pithus). These reports offer a comprehensive analysis of the malware samples, enabling researchers to gain a deeper understanding of the attacks and their characteristics.

Categories:
64 Views

Recent advances in generative visual content have led to a quantum leap in the quality of artificially generated Deepfake content. Especially, diffusion models are causing growing concerns among communities due to their ever-increasing realism. However, quantifying the realism of generated content is still challenging. Existing evaluation metrics, such as Inception Score and Fréchet inception distance, fall short on benchmarking diffusion models due to the versatility of the generated images.

Categories:
71 Views

Pages