This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Attacks and synthetic background traffic. ... These datasets are generated by capturing information from a synthetic environment, where benign user activ...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2011 NC Cyber Defense Competition ... These log files are packet captures from the 2011 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2012 NC Cyber Defense Competition ... These log files are packet captures from the 2012 National Collegiate Cyber Defense Competition (nccdc,org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
ddosflowgen is a tool that models a DDoS attack and generates synthetic traffic datasets from multiple views. You can define the number of attacking networks...
I-RAM Risk Analytics ... interface to the analytics capability of the Internet Risk Assessment & Mitigation (I-RAM) project for measuring Internet Risk. The...
Network statistical measures associated with ASN relationship graphs. ... This dataset contains different statistical measures that were computed for the net...
The Real Data Corpus (RDC) is a collection of disk images extracted from secondary storage devices that were acquired from second-hand markets around the wor...