This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthetic traffic and network attacks ... The 2009 DARPA dataset is a synthesized dataset created to simulate real Internet traffic and network attacks. ...
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
Attacks and synthetic background traffic. ... These datasets are generated by capturing information from a synthetic environment, where benign user activ...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service D...
FRGP Continuous Flow Data ... Daily Argus files with flows on a 1Gb/s link between FRGP.net and Century Link/Comcast. Has traffic from several academic in...
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The flows are on a 10Gb/s link between a regio...
US coastal network infrastructure map shapefile ... This data set is a shapefile for coastal network infrastructure in the US. This data set was used to con...
Network Time Protocol (NTP) packet traces ... This dataset is comprised of NTP log data collected from the NTP server infrastructure at the Wisconsin. Each ...
Web Cookies ... The cookies in this data set were gathered from crawls of the top 100K Alexa web sites conducted in November, 2013 and April, 2015. Due to pa...
Internet outage/attack/congestion event log ... This dataset contains details about the events detected by the BigBen internet-wide event monitoring system d...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber threat indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/ AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
I-RAM Risk Analytics ... interface to the analytics capability of the Internet Risk Assessment & Mitigation (I-RAM) project for measuring Internet Risk. The...
Network statistical measures associated with ASN relationship graphs. ... This dataset contains different statistical measures that were computed for the net...