This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


Aktaion Dataset
External Dataset
External Data Source
University of Arizona
55 (lowest rank is 55)

Category & Restrictions

intrusion detection, cyber defense, network data, traffic flow data


This collection contains labeled network traffic data in ARFF format. The original purpose was to train ransomware detection in the Aktaion IDS.

Data was collected from multiple sources, most notably and as PCAP data.    Due to license restrictions, the shared data is limited to the example data, which is in ARFF format, and derived from the raw PCAP data in two steps: PCAP to Bro format conversion, and then feature extraction (microbehaviors) to ARFF (using Aktaion).

Aktaion is a lightweight Java virtual machine based project for detecting exploits (and more generally attack behaviors). The project is meant to be a learning/teaching tool on how to blend multiple security signals and behaviors into an expressive framework for intrusion detection. The key abstraction we wanted to prototype is the idea of a micro behavior. This concept helps to provide an expressive mechanism to add high level IOCs such as timing behavior of a certain malware family in parallel to simple statistics, rules or anything relevant to building a programmatic description of a sequential evolving set of adverse behaviors.

Additional Details

cybercrime, network analyzers, blogger, internet services supporting openid, 1260, dimension reduction, external data source, aktaion dataset, feature extraction, pcap, telecom, traffic analysis, scareware, bro, malware, virtualization software, abstraction, inferlink corporation, internet security, cyberwarfare, intrusion detection system, virtual machine, cyberattack, cryptanalysis, exploit, ransomware