To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.
MIT Lincoln Laboratory
University of Southern California-Information Sciences Institute
15 (lowest rank is 50)
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives.
The Insider Threat Data Corpus consists of twelve (12) scenarios. Six (6) of this scenarios include specific activities to support an enterprise insider goals. The other six(6) are"false positive" scenarios, where the activities are similar to an insider, but the actor' goals are not that of an insider. Each scenario can be characterized by the primary threat type posed in the scenario, its temporal distribution, the trigger for threat, and the party carrying out the attack.
cybercrime, data, enterprise, lariat, statistical classification, insider threat activity, mit lincoln laboratory, network, malicious activity, malicious, insider threat action, mit, lincoln adaptable real time information assurance testbed, 719, insider, malware, insider_threat_data_corpus-20160601, malware installation, false, internet security, positive, false positives and false negatives, cyberwarfare, dhs, cyber range, synthetic, nefarious activity, university of southern california-information sciences institute, insider threat scenario, cyberattack, department of homeland security, lincoln lab, malicious threat, insider threat, threat, exploit, massachusetts institute technology, dhs cyber security division
insider threat malicious insider synthetic data false positive enterprise network