You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -242,7 +242,8 @@ Zheng, M., Robbins, H., Chai, Z., Thapa, P., & Moore, T. (2018). Cybersecurity r
242
242
```
243
243
244
244
Tries to construct a taxonomy of the types of created and shared cybersecurity data(sets) by inspecting 965 related papers.
245
-
Does not provide an actual list, rather aims to describe general observations, like the fact that only 6% of the surveyed papers created a dataset *and* made it publicly available.
245
+
Does not provide an actual list, rather aims to describe general observations, like the fact that only 6% of the surveyed papers created a dataset
246
+
*and* made it publicly available.
246
247
247
248
### A survey of deep learning-based network anomaly detection (2017)
248
249
@@ -310,25 +311,16 @@ Referenced collections:
310
311
311
312
`Last updated` refers to the last time a new entry was added to the collection.
312
313
313
-
### Malware Traffic Analysis
314
-
315
-
```
316
-
https://www.malware-traffic-analysis.net/
317
-
(accessed 19.02.2024, last updated 14.02.2024)
318
-
```
319
-
320
-
Various pcaps and malware samples stemming from individual campaigns or attack instances, but without any overall categorization or even overview.
321
-
They are available as blog posts named something like "DarkGate activity" or "GootLoader Infection", which each one listing some references and download links to any relevant files.
A large collection of pcap files and other repositories which are hosting pcaps themselves.
331
-
They are categorized into CDX, Malware Traffic, Network Forensics, SCADA/ICS, CTF, Packet Injection/Man-on-the-Side, and Uncategorized.
321
+
A "curated" personal collection of various cybersecurity-related datasets or collections, grouped into several categories such as "Network", "Software" or "Fraud".
322
+
Each entry is described in only one or two sentences, and most datasets are not, or only partially, suitable for IDS research.
323
+
The list is somewhat deprecated and does especially lack meaningful host-based datasets.
332
324
333
325
### Digital Corpora
334
326
@@ -341,17 +333,6 @@ A collection of datasets mostly designed for the use in forensics education.
341
333
It consists of various disk images, memory dumps and pcaps, as well as a bunch of benign and malicious files.
A "curated" personal collection of various cybersecurity-related datasets or collections, grouped into several categories such as "Network", "Software" or "Fraud".
352
-
Each entry is described in only one or two sentences, and most datasets are not, or only partially, suitable for IDS research.
353
-
The list is somewhat deprecated and does especially lack meaningful host-based datasets.
354
-
355
336
### IMPACT
356
337
357
338
```
@@ -363,6 +344,36 @@ The "Information Marketplace for Policy and Analysis of Cyber-Risk and Trust" (I
363
344
These are for the most part made up of network related files (pcaps and DNS logs) from a wide variety of scenarios (CTF events, IoT, corpo networks, etc.), as well as some miscellaneous things like network shapefiles.
364
345
55 of these datasets were created by IMPACT, 15 are external (mostly CAIDA). Many datasets require prior authorization to access them.
365
346
347
+
### Malware Traffic Analysis
348
+
349
+
```
350
+
https://www.malware-traffic-analysis.net/
351
+
(accessed 19.02.2024, last updated 14.02.2024)
352
+
```
353
+
354
+
Various pcaps and malware samples stemming from individual campaigns or attack instances, but without any overall categorization or even overview.
355
+
They are available as blog posts named something like "DarkGate activity" or "GootLoader Infection", which each one listing some references and download links to any relevant files.
356
+
357
+
### NETRESEC
358
+
359
+
```
360
+
https://www.netresec.com/?page=PcapFiles
361
+
(accessed 19.02.2024, last updated 04.01.2024)
362
+
```
363
+
364
+
A large collection of pcap files and other repositories which are hosting pcaps themselves.
365
+
They are categorized into CDX, Malware Traffic, Network Forensics, SCADA/ICS, CTF, Packet Injection/Man-on-the-Side, and Uncategorized.
366
+
367
+
### Public Security Log Sharing Site
368
+
369
+
```
370
+
https://log-sharing.dreamhosters.com/
371
+
(accessed 18.02.2024, last updated 11.08.2010)
372
+
```
373
+
374
+
A collection which started as an effort to collect various log samples, but seems to have been discontinued after operating for about one year.
375
+
Currently, it consists of nine entries containing Linux syslogs, firewall logs, apache logs, and web proxy logs.
0 commit comments