This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthetic traffic and network attacks ... The 2009 DARPA dataset is a synthesized dataset created to simulate real Internet traffic and network attacks. ...
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
Attacks and synthetic background traffic. ... These datasets are generated by capturing information from a synthetic environment, where benign user activ...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2011 NC Cyber Defense Competition ... These log files are packet captures from the 2011 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service D...
Non-anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Non-anonymized database pertaining to the AlphaBay marketplace. This data ...
FRGP Continuous Flow Data ... Daily Argus files with flows on a 1Gb/s link between FRGP.net and Century Link/Comcast. Has traffic from several academic in...
2012 NC Cyber Defense Competition ... These log files are packet captures from the 2012 National Collegiate Cyber Defense Competition (nccdc,org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Non-anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Non-anonymized database pertaining to th...
Anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Anonymized database pertaining to the AlphaBay marketplace. This data was used...
Non-anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... "Non-anonymized subset of the databa...
Non-anonymized data for the paper Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. ... Non-anonymized subset of the d...
Anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Anonymized data for the Dream, Traderoute, B...
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The flows are on a 10Gb/s link between a regio...
Anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... Anonymized data for the paper Measuring ...
Anonymized data for the paper Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. ... Anonymized subset of the databases...
CAIDA's ranking of Autonomous Systems (AS) and organizations ... This interactive tool presents the BETA version of AS Rank, CAIDA's ranking of Autonomous Sy...
Henya: CAIDA's large-scale Internet topology query system ... Henya is CAIDA's large-scale Internet topology query system which provides a remote search of t...
Anonymized data for the Hansa online anonymous marketplace (2015-2017) ... Anonymized database pertaining to the Hansa marketplace. This data was used in the...
Non-anonymized data for the Hansa online anonymous marketplace (2015-2017) ... "Non-anonymized database pertaining to the Hansa marketplace. This data was us...
Data used in the "A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning" ... Three SQL databases containing the data used in the "A Nearly Four-Ye...
Vela: on-demand topology measurement service ... Vela is the on-demand topology measurement service that provides acess to CAIDA's Archipelago (Ark) infrastr...