Security

This dataset was created for the following paper: Seonghoon Jeong, Boosun Jeon, Boheung Chung, and Huy Kang Kim, "Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks," Vehicular Communications, DOI: 10.1016/j.vehcom.2021.100338.

 

Categories:
4304 Views

This is the dataset provided and collected while "Car Hacking: Attack & Defense Challenge" in 2020. We are the main organizer of the competition along with Culture Makers and Korea Internet & Security Agency. We are very proud of releasing these valuable datasets for all security researchers for free.

The competition aimed to develop attack and detection techniques of Controller Area Network (CAN), a widely used standard of in-vehicle network. The target vehicle of competition was Hyundai Avante CN7.

Categories:
11062 Views

Bluetooth communication is widely adopted in IoMT devices due to its various benefits. Nevertheless, because of its simplicity as a personal wireless communication protocol, Bluetooth lacks the security mechanisms which may result in devastating outcomes for patients treated using wireless medical devices.

Categories:
1396 Views

Figure Data Backup for paper, "Co-Evolution of Malware Threats in the U.S. Commercial Sector and Defense Industrial Base"

Categories:
116 Views

Producing secure software is challenging. The poor usability

of security Application Programming Interfaces (APIs) makes this even

harder. Many recommendations have been proposed to support developers

by improving the usability of cryptography libraries and APIs; rooted in

wider best practice guidance in software engineering and API design. In

this SLR, we systematize knowledge regarding these recommendations.

Categories:
288 Views

The dataset contains memory dump data which is generated continuously. For the experiment we carried out, we implemented the volatile data dump module which generated around 360 VM memory dump images of average size 800Mb each (Total 288GB). These data files are compressed using gzip utility. Further zipped to 79.5GB one single file of memory evidence.
Out of these preserved and stored memory dump dataset, 79 files of size 17.3GB were generated during the attack. This means the data 21.76% of data (in size) is potential evidence.

Categories:
1400 Views

This dataset is from apache access log server. It contains: ip address, datetime, gmt, request, status, size, user agent, country, label. The dataset show malicious activity in IP address, request, and so on. You can analyze more as intrusion detection parameter.

Paper: http://jtiik.ub.ac.id/index.php/jtiik/article/view/4107

Categories:
4449 Views

This dataset is in support of my research paper 'Comparative Non-Linear Flux Matrices & Thermal Losses in BLDC with Different Pole Pairs' .

Preprint : https://doi.org/10.36227/techrxiv.19687287.v1

Categories:
3373 Views

This dataset is composed of side channel information (e.g., temperatures, voltages, utilization rates) from computing systems executing benign and malicious code.  The intent of the dataset is to allow aritificial intelligence tools to be applied to malware detection using side channel information.

Categories:
1005 Views

'Test Dataset' folder:

-Real_sk:  random generated secret keys datasets

-Trace_data: traces generated from chosen ciphertexts

 

Categories:
309 Views

Pages