This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
IPs for h-scans of the network telescope ... This dataset contains IP addresses that conduct horizontal scans of UCSD's network telescope. We use Bro's de...
A collection of router IP addresses geolocated to the city level. ... A collection of router interface IP addresses geolocated to the city level. 11,857 IP ...
IPv4 address taxonomy for 24 addr blocks ... We infer utilization of the IPv4 address space and taxonomize //24 address blocks by analyzing and cross-correla...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber threat indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/ AIS_Submission_Guidance_Appendix_A.pdf).
I-RAM Risk Analytics ... interface to the analytics capability of the Internet Risk Assessment & Mitigation (I-RAM) project for measuring Internet Risk. The...