This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1259
ADFA-IDS
External Dataset
External Data Source
University of New South Wales
Unknown
Unknown
56 (lowest rank is 56)

Category & Restrictions

Other
intrusion detection, cyber defense
Unrestricted
true

Description


ADFA IDS is an intrusion detection system dataset made publicly available in 2013, intended as representative of modern attack structure and methodology to replace the older datasets KDD and UNM.

ADFA-WD (Windows dataset) was generated on a Windows XP Service Pack 2 host OS with the XP default firewall enabled for all attacks, and file sharing enabled, a network printer configured, wireless and Ethernet networking. Norton AV 2013 was used to scan certain payloads. FTP server, web server and management tool, and streaming audio digital radio package were activated.

A target ratio of 1 : 10 : 1 =normal data:validation data:attack data was used to guide collection and structuring activities.

Vectors:
TCP ports, web based vectors, browser attacks, and malware attachments

Effects:
Bind shell, reverse shell, exploitation payload, remote operation, staging, system manipulation, privilege escalation, data exfiltration, and back-door insertion.

Additional Details

13.4MB
false
Unknown
adfa, ids, adfa-ids, 1259, inferlink, external, inferlink corporation, corporation, external data source, source, dataset, 2013, system, attack, datasets, detection, modern, publicly, kdd, intended, intrusion, structure, unm, methodology, replace, representative, xp, server, attacks, vectors, shell, windows, enabled, web, tcp, activated, normal, management, staging, audio, browser, ratio, ftp, malware, escalation, service, activities, target, reverse, structuring, firewall, norton, wireless, os, operation, digital, scan, file, printer, door, package, based, configured, guide, validation, manipulation, host, payload, bind, exploitation, radio, remote, networking, sharing, pack, streaming, default, network, wd, ports, privilege, generated, payloads, attachments, other, insertion, av, effects, ethernet, tool, exfiltration