Datasets

Refine Results

(Filters Applied) Clear All
Date:
June 2019 – June 2020
Source:
Tcpdumps of various network applications on an isolated virtual subnet connected to the internet.
Data type:
Packet Capture Files (pcap)

Summary

This dataset is a collection of labelled PCAP files, both encrypted and unencrypted, across 10 applications. It was created to assist the development of machine learning tools that would allow operators to see the traffic categories of both encrypted and unencrypted traffic flows. In particular, features of the network packet traffic timing and size information (both inside of and outside of the VPN) can be leveraged to predict the application category that generated the traffic.
Date:
August 2016
Source:
DARPA Cyber Grand Challenge
Data type:
Cyber Security

Summary

The goal of the DARPA CGC was to engender a new generation of autonomous cyber defense capabilities that combined the speed and scale of automation with reasoning abilities exceeding those of human experts. Entrants fielded autonomous systems that competed head-to-head in an isolated network testbed environment on the purpose-built operating system DECREE (DARPA Experimental Cyber Research Evaluation Environment).
Date:
August 2016
Source:
DARPA Cyber Grand Challenge
Data type:
Cyber Security

Summary

The goal of the DARPA CGC was to engender a new generation of autonomous cyber defense capabilities that combined the speed and scale of automation with reasoning abilities exceeding those of human experts. Entrants fielded autonomous systems that competed head-to-head in an isolated network testbed environment on the purpose-built operating system DECREE (DARPA Experimental Cyber Research Evaluation Environment).
Date:
July 2000
Data type:
Cyber Security

Summary

Off-line intrusion detection datasets were produced as per consensus from the Wisconsin Re-think meeting and the July 2000 Hawaii PI meeting.
Date:
September 1999 – October 1999
Data type:
Cyber Security

Summary

Intrusion detection systems were tested in the off-line evaluation using network traffic and audit logs collected on a simulation network. The systems processed these data in batch mode and attempted to identify attack sessions in the midst of normal activities.
Date:
February 1998
Data type:
Cyber Security

Summary

Intrusion detection systems were tested in the off-line evaluation using network traffic and audit logs collected on a simulation network. The systems processed these data in batch mode and attempted to identify attack sessions in the midst of normal activities.

Showing Results

1-6 of 6