Security

The compressed file contains C++ source code for performance measurement

  • Security
  • Last Updated On: 
    Sun, 07/07/2019 - 04:11

    Dataset for an article in IEEE Transactions on Industrial Informatics

  • Standards Research Data
  • Last Updated On: 
    Sat, 06/15/2019 - 12:01

    The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

  • Communications
  • Last Updated On: 
    Thu, 05/30/2019 - 04:51

    The data that we used to test the performance of different encryption methods

  • Security
  • Last Updated On: 
    Wed, 05/29/2019 - 04:07

    The Automation for Vehicles is the current trend, which transforms the merely conveyer to well-furnished moving home-like-feeling. As the country is opened to globalization, people’s income is rising. And the travelling is now become essential part of the life. So, governments prefer not only to raise their road’s quality but also the width of it. As a result, four track National Highway roads are flowing throughout the country like blood veins.

  • Security
  • Last Updated On: 
    Fri, 05/10/2019 - 17:42

    The training and test dataset for DNS tunneling detection.

  • Security
  • Last Updated On: 
    Wed, 04/03/2019 - 16:58

    privacy location data

  • Security
  • Last Updated On: 
    Thu, 02/21/2019 - 09:11

    This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

  • Communications
  • Last Updated On: 
    Thu, 01/31/2019 - 10:23

    Device Fingerprinting for Access Control over a Campus and Isolated Network Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset. First Experiment: Raspberry Pi We developed a packet sniffer application to capture IAT of packets.

  • Communications
  • Last Updated On: 
    Sat, 02/02/2019 - 22:53

    Device Fingerprinting for Access Control over a Campus and Isolated Network

    Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset.

     

    First Experiment: Raspberry Pi

  • Communications
  • Last Updated On: 
    Sat, 01/26/2019 - 09:08

    Pages