This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
Attacks and synthetic background traffic. ... These datasets are generated by capturing information from a synthetic environment, where benign user activ...
2013 NC Cyber Defense Competition ... These log files are packet captures from the 2013 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2011 NC Cyber Defense Competition ... These log files are packet captures from the 2011 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2012 NC Cyber Defense Competition ... These log files are packet captures from the 2012 National Collegiate Cyber Defense Competition (nccdc,org). CCDC i...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Medical device network traffic collected from a Philips Healthcare Supplied Network (PSN). The data collection system consisted of a Fluke ProSim 8 patient ...
Normal operation data was collected from a network of computers running OpenICE software. Medical devices included: one each to a Puritan-Bennet 840 ventilat...
Normal operation data was collected from a network of computers running OpenICE software. One MacOS computer was running an OpenICE supervisor with four Beag...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber threat indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/ AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
Infusion pump Control via OpenICE FROA App - Normal and Non-Normal State Data ... OpenIce FROA app with physical infusion pump Data captured from the loopba...
Normal state and failure mode data capture for Philips network medical devices. ... Normal state and failure mode data capture for Philips network devices. ...
Normal state, failure mode and attack simulation for medical laboratory camera system ... Microscope camera was powered via ethernet, connected over a local ...
Normal state, failure-mode and attack simulation of GE medical device monitoring network ... Normal state, failure-mode and attack simulation of GE medical d...
Normal state, failure-mode and attack simulation of Philips medical device monitoring network. ... Normal state, failure-mode and attack simulation of Philip...