The dataset contains memory dump data which is generated continuously. For the experiment we carried out, we implemented the volatile data dump module which generated around 360 VM memory dump images of average size 800Mb each (Total 288GB). These data files are compressed using gzip utility. Further zipped to 79.5GB one single file of memory evidence.
Out of these preserved and stored memory dump dataset, 79 files of size 17.3GB were generated during the attack. This means the data 21.76% of data (in size) is potential evidence.

Categories:
310 Views

This dataset is from apache access log server. It contains: ip address, datetime, gmt, request, status, size, user agent, country, label. The dataset show malicious activity in IP address, request, and so on. You can analyze more as intrusion detection parameter.

Instructions: 

This dataset contains: ip address, datetime, gmt, request, status, size, user agent, country, label. Allowed traffic only from Indonesia, because the web is local purpose, so this dataset assume the traffic from abroad is prohobited.

Categories:
737 Views

This dataset is composed of side channel information (e.g., temperatures, voltages, utilization rates) from computing systems executing benign and malicious code.  The intent of the dataset is to allow aritificial intelligence tools to be applied to malware detection using side channel information.

Categories:
397 Views

'Test Dataset' folder:

-Real_sk:  random generated secret keys datasets

-Trace_data: traces generated from chosen ciphertexts

 

Categories:
56 Views

There are two datasets: Drebin4000 and AMD6000.

Categories:
1690 Views

Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today!

Categories:
501 Views

Simulation Code

Instructions: 

To access the code, please click the Link  "Hidden Real Modulus RSA(HRM-RSA)"

Categories:
28 Views

Simulation Code

Instructions: 

To see the code, please Click the URL "Hidden Modulus RSA (HRM-RSA)"?

Categories:
18 Views

Network Address Translation (NAT), which is present in almost all routers and CPEs, maps private IP addresses to routable or public IP addresses. This feature has advantages such as reuse of private IP addresses but also has disadvantages such as creating “Shadow IT” where network admins do not have knowledge of all devices on their network. This dataset contains network traffic that is double-NATed thus replicating the scenario of shadow IT in an enterprise context.

Categories:
591 Views

This data set contains the evaluation results of UMLsecRT:

  • All completed answers to the user-study on the usability of the adapted models.
  • The runtime-measurements and profiling outcomes of the experiment on the DaCapo benchmark.
Instructions: 

All results are formatted as CSV files (exported from LimeSurvey) or as LibreOffice spreadsheets (saved as *.odt)

Categories:
49 Views

Pages