This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2011 NC Cyber Defense Competition ... These log files are packet captures from the 2011 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service D...
FRGP Continuous Flow Data ... Daily Argus files with flows on a 1Gb/s link between FRGP.net and Century Link/Comcast. Has traffic from several academic in...
2012 NC Cyber Defense Competition ... These log files are packet captures from the 2012 National Collegiate Cyber Defense Competition (nccdc,org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The flows are on a 10Gb/s link between a regio...