This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Map of US long-haul infrastructure ... Materials in this archive relate to the paper by Durairajan et al. entitled "InterTubes: A Study of the US Long-haul F...
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Network maps shapefile archive ... This data set consists of an gzip archive of shapefiles for maps of a selection of 50 network service provider networks fr...
US coastal network infrastructure map shapefile ... This data set is a shapefile for coastal network infrastructure in the US. This data set was used to con...
Network Time Protocol (NTP) packet traces ... This dataset is comprised of NTP log data collected from the NTP server infrastructure at the Wisconsin. Each ...
Medical device network traffic collected from a Philips Healthcare Supplied Network (PSN). The data collection system consisted of a Fluke ProSim 8 patient ...
US metro fiber network maps ... This data set consists of an gzip archive of shapefiles for maps of a selection of 48 metro fiber network maps in the US. ...
Web Cookies ... The cookies in this data set were gathered from crawls of the top 100K Alexa web sites conducted in November, 2013 and April, 2015. Due to pa...
This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory's corporate, inter...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber threat indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/ AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
The Honeynet Project goal is to improve Internet security by sharing lessons learned about the most common threats. The Honeynet project deploys honeynets al...
Infusion pump Control via OpenICE FROA App - Normal and Non-Normal State Data ... OpenIce FROA app with physical infusion pump Data captured from the loopba...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
Crawl of the Alexa Top Million domains from October 5-7, 2016 using ZBrowse, a headless Chrome browser instrumented to track object dependencies. ... Crawl o...
SSLyze scans of POP, IMAP and SMTP related TCP ports, 20,000,000 IP/port combinations, Apr 2015 - August 2015 ... SSLyze results for e-mail related TCP ports...