This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthetic traffic and network attacks ... The 2009 DARPA dataset is a synthesized dataset created to simulate real Internet traffic and network attacks. ...
Emulated attacks in enterprise traffic ... These traces were created by monitoring an emulated DoS attack from a single known source to single known targ...
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. ... Wi...
Internet outage/attack/congestion event log ... This dataset contains details about the events detected by the BigBen internet-wide event monitoring system d...
Attacks and synthetic background traffic. ... These datasets are generated by capturing information from a synthetic environment, where benign user activ...
Set of 3 DoS attacks from 2002 ... This dataset contains three attacks. The first attack is a reflector attack that sends echo reply packets targeted to a vi...
Timeseries of 80 DoS attacks ... The dataset has one millisecond granularity timeseries of 80 denial of service attacks captured at Los Nettos in 2002.
Artificial traces with uniform attacks ... This trace set contains 16 trace pairs created in August 2007 using background trace data recorded in December...
Hourly compressed pcap files of raw IPv4 packets of unsolicited traffic captured by the UCSD Network Telescope instrumentation. ... The dataset contains near...
DoS attacks dataset ... In this study the focus was on the universal type of application DoS slow-rate attacks that are often seen in two variations: slow se...
Firewall/IDS logs from 1700+ networks ... DSHIELD.ORG is research effort funded by SANS Institute as part of its Internet Storm Center. DSHIELD??s objective...
The Honeynet Project goal is to improve Internet security by sharing lessons learned about the most common threats. The Honeynet project deploys honeynets al...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service ...
BoNeSi, the DDoS Botnet Simulator, is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS atta...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service D...
Multiple datasets containing cyber attacks against 2 laboratory scale industrial control systems; a gas pipeline and water storage tank. ... The data sets in...
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also f...
UDP scan and meassurement of public UDP services that could be used in relation to Amplified DDoS attacks. ... The dataset consists of 20 UDP Services and 21...
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. ... King Phisher features an easy to use, yet very...
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker....
Stop denial of service attacks, configurable allowable burst rate. ... Configurable Denial-Of-Service prevention for http services.
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The IP addresses are fully anonymized using a...
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The flows are on a 10Gb/s link between a regio...
This dataset contains information about the Denial-of-Service (DoS) activity seen in the UCSD Network Telescope. ... This dataset is aggregated from the unid...
This dataset contains information about the Denial-of-Service (DoS) activity seen in the UCSD Network Telescope. ... This dataset is aggregated from the unid...
Trident Attack Traffic Generator ... Trident is an attack traffic generator that is designed for use in a laboratory setting. The target application for tri...
This dataset created in April 2017 contains information about geographic locations of interconnection facilities, and Autonomous Systems that have peering in...
The HTTP dataset CSIC 2010 contains thousands of web requests automatically generated. It can be used for the testing of web attack protection systems. It wa...
This dataset consists of hourly files of unsolicited traffic captured by the UCSD Network Telescope traces and aggregated into the FlowTuple format. ... Raw ...
This dataset is a collection of labeled RTU telemetry streams from a gas pipeline system in Mississippi State University's Critical Infrastructure Protection...
The data sets contain traffic in and out of the web server of the Student Union for Electrical Engineering (Fachbereichsvertretung Elektrotechnik) at Ulm Uni...
ADFA IDS is an intrusion detection system dataset made publicly available in 2013, intended as representative of modern attack structure and methodology to r...
This data set consists of wide variety of intrusions simulated in a military network environment. ... This is the data set used for intrusion detector learni...
The BoT-IoT dataset was created by designing a realistic network environment in the Cyber Range Lab of The center of UNSW Canberra Cyber. The environment inc...
This project developed a systematic approach to generate diverse and comprehensive benchmark datasets for intrusion detection resulting in a dataset containi...
The Cyberprobe project is an open-source distributed architecture for real-time monitoring of networks against attack. ... The probe, cyberprobe has the foll...
ddosflowgen is a tool that models a DDoS attack and generates synthetic traffic datasets from multiple views. You can define the number of attacking networks...
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute p...
Regular daily scans of IPv4 and the Alexa Top 1 Million domains on HTTPS and SMTP+StartTLS for the Heartbleed vulnerability. ... This dataset is composed of ...
Infection Monkey is an open source Breach and Attack Simulation tool to evaluate the security posture of your network. ... The Infection Monkey is an attack ...
The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (Ge...
The UNB ISCX IDS 2012 dataset consists of labeled network traces, including full packet payloads in pcap format. ... To simulate user behaviour, the behaviou...
This dataset consists of mouse gesture dynamics datasets, whereby 41 participants were asked to produce gesture samples using the mouse, and the dynamics wer...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
pythem is a multi-purpose pentest framework written in Python. ... pythem can test multiple different types of attacks and phishing instances such as: ARP s...
RegEx Denial of Service (ReDos) Scanner ... Helps find regular expressions susceptible to denial of service attacks.
A Dataset for the Evaluation of Cyclostationarity-Based Network IDS ... The dataset is built with real traffic and up-to-date attacks. These data come from s...
Waidps is a wireless Auditing, Intrusion Detection & Prevention System ... WAIDPS is an open source wireless swissknife written in Python and work on Linux e...