Security
A Dataset Bundle for Building Automation and Control Systems
useful for Security Analysis and to study the normal operation of these systems
This document describes a dataset bundle with diverse types of attacks, and also a not poisoned dataset. The capture was obtained in a real house with a complete Building Automation and Control System (BACS). This document describes the several included datasets and how their data can be employed in security analysis of KNX based building Automation.
- Categories:
In this project, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including, Cloud Computing Layer, Network Functions Virtualization Layer, Blockchain Network Layer, Fog Computing Layer, Software-Defined Networking Layer, Edge Computing Layer, and IoT and IIoT Perception Layer.
- Categories:
Power system state estimation (PSSE) plays a vital role in stable operation of modern smart grids, while it is vulnerable to cyber attacks. False data injection attacks (FDIA), one of the most common cyber attacks, can tamper with measurement data and bypass the bad data detection (BDD) mechanism, leading to incorrect PSSE results.
- Categories:
Network penetration testing is a complicated step that requires a lot of research and preparation going into it. Once you’ve decided on conducting the procedure, it’s equally important to select a third-party service provider that upholds quality and possesses adequate experience. For this, there are a series of network penetration testing interview questions – and desired answers – you can keep in mind when screening potential service providers.
- Categories:
It contains the original data corresponding to all simulation diagrams in the paper, including but not limited to the original data of maps, carpooling users, starting points, destinations, and routes.
- Categories:
This dataset consisting of MODBUS/TCP communication was created using the Factory.IO simulator (trial version is available). The dataset contains different scenarios that control different industrial processes. For each scenario, files are provided to capture normal communication and communication with anomalies. The purpose of the dataset is to support research and evaluation of anomaly detection methods in the field of ICS.
- Categories:
You don’t need to be a cybersecurity expert to know that the world of application security is changing at an alarming pace. The tools and techniques that attackers use are becoming more sophisticated, and it’s difficult for even the most well-resourced organizations to keep up with them.
- Categories:
We constructed a rich AttackDB that consists of CTI from the MITRE ATT\&CK Enterprise knowledge base, the AlienVault Open Threat Exchange, the IBM X-Force Exchange and VirusTotal.
- Categories:
Cloud forensics is different than digital forensics because of the architectural implementation of the cloud. In an Infrastructure as a Service (IaaS) cloud model. Virtual Machines (VM) deployed over the cloud can be used by adversaries to carry out a cyber-attack using the cloud as an environment.
- Categories: