Security
This is for BGP anomaly analysis
- Categories:
Gaming consoles are very common connected devices which have evolved in functionality and applications (games and beyond) they support. This diversity of traffic generated from these consoles has diverse quality of service (QoS) requirements. However, in order to offer diverse QoS, ISPs and operators must be able to classify this traffic. To enable research in traffic classification (Machine Learning based or other), we have generated and collected this dataset. This is a labelled dataset collected from a gaming console, PlayStation 4.
- Categories:
The data are four Xilinx ISE projects for Montgomery modualr multiplication and modular exponentiation.
- Categories:
The CHU Surveillance Violence Dataset (CSVD) is a collection of CCTV footage of violent and non-violent actions aiming to characterize the composition of violent actions into more specific actions. We produced several simple action classes for violent and non-violent actions do add variety and better distribution among simple and complex action classes for RGB and Action Silhouette Videos (enhanced Optical Flow Images) with their localized actions.
- Categories:
Due to the large number of vulnerabilities in information systems and the continuous activity of attackers, techniques for malicious traffic detection are required to identify and protect against cyber-attacks. Therefore, it is important to intentionally operate a cyber environment to be invaded and compromised in order to allow security professionals to analyze the evolution of the various attacks and exploited vulnerabilities.
This dataset includes 2016, 2017 and 2018 cyber attacks in the HoneySELK environment.
- Categories:
This dataset contains a list of popular websites and their privacy statements. The websites belong to the three largest South Asian economies, namely, India, Pakistan, and Bangladesh. Each website is categorized into 10 sectors, namely, e-commerce, finance/banking, education, healthcare, news, government, telecom, buy and sell, job/freelance, blogging/discussion. We hope that this dataset will help researchers in investigating website privacy compliance.
- Categories:
We build an original dataset of thermal videos and images that simulate illegal movements around the border and in protected areas and are designed for training machines and deep learning models. The videos are recorded in areas around the forest, at night, in different weather conditions – in the clear weather, in the rain, and in the fog, and with people in different body positions (upright, hunched) and movement speeds (regu- lar walking, running) at different ranges from the camera.
- Categories:
Presented here is a dataset used for our SCADA cybersecurity research. The dataset was built using our SCADA system testbed described in our paper below [*]. The purpose of our testbed was to emulate real-world industrial systems closely. It allowed us to carry out realistic cyber-attacks.
- Categories:
This repository contains the results of running more than 70 samples of ransomware, from different families, dating since 2015. It contains the network traffic (DNS and TCP) and the Input/Output (I/O) operations generated by the malware while encrypting a network shared directory. These data are contained in three files for each ransomware sample: one with the information from the DNS requests, other with the TCP connections another one containing the I/O operations. This information can be useful for testing new and old ransomware detection tools and compare their results.
- Categories: