This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
SSDP reflection attack ... About 3 hours of DDoS attack traffic to a victim in the form of Argus flows. Most of the attack traffic is UDP Simple Service D...
Non-anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Non-anonymized database pertaining to the AlphaBay marketplace. This data ...
FRGP Continuous Flow Data ... Daily Argus files with flows on a 1Gb/s link between FRGP.net and Century Link/Comcast. Has traffic from several academic in...
Non-anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Non-anonymized database pertaining to th...
Anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Anonymized database pertaining to the AlphaBay marketplace. This data was used...
Non-anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... "Non-anonymized subset of the databa...
Anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Anonymized data for the Dream, Traderoute, B...
NTP reflection attack ... 3 months of daily Network Time Protocol (NTP) traffic in the form of Argus flows. The flows are on a 10Gb/s link between a regio...
Anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... Anonymized data for the paper Measuring ...
Medical device network traffic collected from a Philips Healthcare Supplied Network (PSN). The data collection system consisted of a Fluke ProSim 8 patient ...
Normal operation data was collected from a network of computers running OpenICE software. Medical devices included: one each to a Puritan-Bennet 840 ventilat...
Normal operation data was collected from a network of computers running OpenICE software. One MacOS computer was running an OpenICE supervisor with four Beag...
Android Adware and General Malware Dataset ... The AAGM dataset is captured by installing the Android apps on the real smartphones semi-automated. The datase...
This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families. ......
A system to built to find the relations between the app on androids. ... This data set wich consist in 72 original apps from different origins, and the follo...
Assessing performance of any detection approach requires experimentation with data that is heterogeneous enough to simulate real traffic to an acceptable lev...
A Labeled Dataset with Botnet, Normal and Background traffic ... The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Rep...
DoS attacks dataset ... In this study the focus was on the universal type of application DoS slow-rate attacks that are often seen in two variations: slow se...
A labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files ... The ember dataset is a ...
Anonymized data for the Hansa online anonymous marketplace (2015-2017) ... Anonymized database pertaining to the Hansa marketplace. This data was used in the...
Non-anonymized data for the Hansa online anonymous marketplace (2015-2017) ... "Non-anonymized database pertaining to the Hansa marketplace. This data was us...
Infusion pump Control via OpenICE FROA App - Normal and Non-Normal State Data ... OpenIce FROA app with physical infusion pump Data captured from the loopba...
The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (Ge...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
User-Computer Authentication Events Data ... This anonymized data set encompasses 9 continuous months and represents 708,304,516 successful authentication ev...