Security

This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).

1541 views
  • Communications
  • Last Updated On: 
    Thu, 01/31/2019 - 10:23

    Device Fingerprinting for Access Control over a Campus and Isolated Network Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset. First Experiment: Raspberry Pi We developed a packet sniffer application to capture IAT of packets.

    121 views
  • Communications
  • Last Updated On: 
    Sat, 02/02/2019 - 22:53

    Device Fingerprinting for Access Control over a Campus and Isolated Network

    Device Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset.

     

    First Experiment: Raspberry Pi

    187 views
  • Communications
  • Last Updated On: 
    Sat, 01/26/2019 - 09:08

    We have included the code of protocol verification for ProVerif (in .pv format) and Scyther (in .spdl format) in the “Supplementary Materials” (Supplementary-Materials.pdf) of the revised manuscript. Essentially, the .pdf file of the “Supplementary Materials” includes: A. The source code for the protocol verifier Scyther (in .spdl format); and B. The source code for the protocol verifier ProVerif (in .pv format).

    68 views
  • Security
  • Last Updated On: 
    Wed, 01/16/2019 - 10:22

    This dataset was collected from an industrial control system running the Modbus protocol. It is used to train a deep adversarial learning model. This model is used to generate fuzzing data in the same format as the real one. The data is a sequence of hexadecimal numbers. The followed generated data is produced by the already trained model.

     

    205 views
  • Communications
  • Last Updated On: 
    Tue, 01/29/2019 - 04:35

     This enclosed file comprises two parts: one is the social network simulation data set generated based on R-MART and power law distribution model; the other is the sourse code of alogorithm 1 to 6 for PBCN. 

    147 views
  • Security
  • Last Updated On: 
    Sat, 12/29/2018 - 08:26

    Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

    89 views
  • Sensors
  • Last Updated On: 
    Fri, 12/21/2018 - 17:16

    These datasets were generated in a computer network environment where eXfiltration Advanced Persistent Threats were launched against a number of high-value targets.

    It is the alert log of the Security Onion SIEM which aggregates alerts from network and host-based intrusion detection systems that are securing the network environment.

    133 views
  • Security
  • Last Updated On: 
    Wed, 12/19/2018 - 14:10

    With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people’s daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the information contained in the text message transmits as a plain text, which exposes it to attacks.

    252 views
  • Communications
  • Last Updated On: 
    Wed, 12/25/2019 - 15:57

    Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

    71 views
  • Security
  • Last Updated On: 
    Thu, 11/08/2018 - 10:34

    Pages