Security

This LTE_RFFI project sets up an LTE device radio frequency fingerprint identification system using deep learning techniques. The LTE uplink signals are collected from ten different LTE devices using a USRP N210 in different locations. The sampling rate of the USRP is 25 MHz. The received signal is resampled to 30.72 MHz in Matlab. Then, the signals are processed and saved in the MAT file form. More details about the datasets can be found in the README document.

Categories:
500 Views

5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices.

Categories:
904 Views

Electric power systems are comprised of cyber and physical components that are crucial to grid resiliency. Data from both components should be collected when modeling power systems: data from communication networks and intrusion detection systems; physical telemetry from sensors and field devices.

Categories:
480 Views

This LTE_RFFI project sets up an LTE device radio frequency fingerprint identification system using deep learning techniques. The LTE uplink signals are collected from ten different LTE devices using a USRP N210 in different locations. The sampling rate of the USRP is 25 MHz. The received signal is resampled to 30.72 MHz in Matlab and is saved in the MAT file form. The corresponding processed signals are included in the dataset. More details about the datasets can be found in the README document.

Categories:
280 Views

The dataset, titled "SensorNetGuard: A Dataset for Identifying Malicious Sensor Nodes," comprises 10,000 samples with 21 features. It is designed to facilitate the identification of malicious sensor nodes in a network environment, specifically focusing on IoT-based sensor networks.

General Metrics

§  Node ID: The unique identifier for each node.

§  Timestamp: The time at which data or a packet is sent or received.

§  IP Address: Internet Protocol address of the node.

Categories:
1115 Views

Physically unclonable functions (PUFs) are foundational components that offer a cost-efficient and promising solution for diverse security applications, including countering integrated circuit (IC) counterfeiting, generating secret keys, and enabling lightweight authentication. PUFs exploit semiconductor variations in ICs to derive inherent responses from imposed challenges, creating unique challenge-response pairs (CRPs) for individual devices. Analyzing PUF security is pivotal for identifying device vulnerabilities and ensuring response credibility.

Categories:
232 Views

Iman Sharafaldin et al. generated the real time network traffic and these are made available at the Canadian Institute of Cyber security Institute website.  The team of researchers published the network traffic data and has made the dataset publicly available in both PCAP and CSV formats. The network traffic data is generated during two days. Training Day was on January 12th, 2018 and Testing Day was on March 11th, 2018.

Categories:
2374 Views

It is a challenging work to solve the geometric attack in the field of digital watermarking. In order to solve the synchronization between the host image and the watermark, image normalization is introduced. Firstly, the geometrically invariant space of image is constructed by using image normalization, and a region of interest (ROI) is obtained from the normalized image by utilizing the invariant centroid theory. Then, the contourlet transform is performed on the ROI. Low-pass sub-band coefficients are divided into non-overlapping blocks.

Categories:
73 Views

The data set downloaded from Wikimedia Download is available as a test data set related to the key-value structure.Searchable encryption schemes that need to implement keyword search can use this dataset as test data.Wikimedia Commons is a media repository of free-to-use images, sounds, videos and other media.

Categories:
26 Views

Oblivion Results is a TXT dataset which contains the report files generated in the experimental phase of Oblivion's development. Knowing the SHA256 hash of a file of interest, if this file is present in our list, the relative report can be consulted.

The set is organized as follows:

Categories:
73 Views

Pages