This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-0924
Botnet Traffic Dataset
External Dataset
External Data Source
Czech Technical University
01/01/2014
01/01/2014
50 (lowest rank is 50)

Category & Restrictions

Other
simulated attacks, malicious traffic, malware
Unrestricted
Unknown

Description


A Labeled Dataset with Botnet, Normal and Background traffic

The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Republic, in 2011. The goal of the dataset was to have a large capture of real botnet traffic mixed with normal traffic and background traffic. The CTU-13 dataset consists in thirteen captures (called scenarios) of different botnet samples. On each scenario we executed a specific malware, which used several protocols and performed different actions.    ; stratosphereips@agents.fel.cvut.cz

Additional Details

N/A
false
Unknown
cybercrime, malware, botnet traffic dataset, spamming, virtualization software, bot, vmware, inferlink corporation, background traffic, cyberwarfare, external data source, 924, botnet, vmware thinapp, exploit