This is a non-IMPACT record, meaning that access to the data is not
controlled by IMPACT. For access, see the directions below.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Summary
DS-0924
Botnet Traffic Dataset
External Dataset
External Data Source
Czech Technical University
01/01/2014
01/01/2014
56 (lowest rank is 56)
Description
A Labeled Dataset with Botnet, Normal and Background traffic
The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Republic, in 2011. The goal of the dataset was to have a large capture of real botnet traffic mixed with normal traffic and background traffic. The CTU-13 dataset consists in thirteen captures (called scenarios) of different botnet samples. On each scenario we executed a specific malware, which used several protocols and performed different actions. ; stratosphereips@agents.fel.cvut.cz
Additional Details
N/A
false
Unknown
traffic, botnet, dataset, botnet traffic dataset, 924, inferlink, inferlink corporation, external data source, corporation, external, 2014, source, background, normal, labeled, ctu, actions, capture, cvut, real, specific, consists, performed, cz, agents, samples, czech, captures, republic, 2011, mixed, executed, scenarios, fel, thirteen, other, scenario, captured, protocols, stratosphereips, goal, malware, called