This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Android Adware and General Malware Dataset ... The AAGM dataset is captured by installing the Android apps on the real smartphones semi-automated. The datase...
This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families. ......
A system to built to find the relations between the app on androids. ... This data set wich consist in 72 original apps from different origins, and the follo...
Assessing performance of any detection approach requires experimentation with data that is heterogeneous enough to simulate real traffic to an acceptable lev...
A Labeled Dataset with Botnet, Normal and Background traffic ... The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Rep...
DoS attacks dataset ... In this study the focus was on the universal type of application DoS slow-rate attacks that are often seen in two variations: slow se...
source code for content reuse detection paper ... This repository contains the code and pointers to datasets used in the paper "Precise Detection of Content ...
C/C++ Library/tool for IP address anonymization ... CryptopANT is a C library for IP address anonymization using crypto-PAn algorithm, originally def...
A labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files ... The ember dataset is a ...
Hadoop reader/format for census/survey data ... A plugin for Hadoop that parses icmptrain output from our ipv4 censuses and surveys.
The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (Ge...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
LDplayer component ... Change DNS queries in a network trace file and generate binary input for dns-replay-{controller,client}.
A proxy that helps to emulate DNS hierarchy in DNS trace replay. ... dns-replay-proxy manipulates packet addresses to emulate DNS hierarchy in LDplayer. Spe...
LDplayer component ... A set of scripts that set up port-based routing and dns-replay-proxy for replaying queries against a recursive server in LDplayer.
LDplayer component ... A set of scripts that generate zone files in order to replay queries against a recursive server in LDplayer.
Tdns-server-proxy is a server-side proxy for DNS. It listens to incoming private T-DNS (with TCP and TLS) and turns it back into UDP queries to a local DNS ...
User-Computer Authentication Events Data ... This anonymized data set encompasses 9 continuous months and represents 708,304,516 successful authentication ev...
A packet capturer and forwarder for active measurement of anycast catchements. ... Verfploeter is a set of tools: Pinger, Packetcapr, and Pingextract. Pinger...
A pinger for active measurement of anycast catchements. ... Verfploeter is a set of tools: Pinger, Packetcapr, and Pingextract. Pinger sends pings to a hitli...