This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Map of US long-haul infrastructure ... Materials in this archive relate to the paper by Durairajan et al. entitled "InterTubes: A Study of the US Long-haul F...
Internet physical infrastructure portal ... Internet Atlas is a visualization and analysis portal for diverse Internet measurement data. The starting point ...
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Non-anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Non-anonymized database pertaining to the AlphaBay marketplace. This data ...
Anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Anonymized database pertaining to the AlphaBay marketplace. This data was used...
Non-anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... "Non-anonymized subset of the databa...
Anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... Anonymized data for the paper Measuring ...
Network Time Protocol (NTP) packet traces ... This dataset is comprised of NTP log data collected from the NTP server infrastructure at the Wisconsin. Each ...
Web Cookies ... The cookies in this data set were gathered from crawls of the top 100K Alexa web sites conducted in November, 2013 and April, 2015. Due to pa...
This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families. ......
A system to built to find the relations between the app on androids. ... This data set wich consist in 72 original apps from different origins, and the follo...
Assessing performance of any detection approach requires experimentation with data that is heterogeneous enough to simulate real traffic to an acceptable lev...
A Labeled Dataset with Botnet, Normal and Background traffic ... The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Rep...
This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory's corporate, inter...
Anonymized data for the Hansa online anonymous marketplace (2015-2017) ... Anonymized database pertaining to the Hansa marketplace. This data was used in the...
Non-anonymized data for the Hansa online anonymous marketplace (2015-2017) ... "Non-anonymized database pertaining to the Hansa marketplace. This data was us...
The Honeynet Project goal is to improve Internet security by sharing lessons learned about the most common threats. The Honeynet project deploys honeynets al...
Infusion pump Control via OpenICE FROA App - Normal and Non-Normal State Data ... OpenIce FROA app with physical infusion pump Data captured from the loopba...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
Normal state and failure mode simulation of mixed medical device production equivalent hospital network ... Normal state and failure mode simulation of mixed...
Normal state and failure mode data capture for Philips network medical devices. ... Normal state and failure mode data capture for Philips network devices. ...
Normal state, failure mode and attack simulation for medical laboratory camera system ... Microscope camera was powered via ethernet, connected over a local ...
Normal state, failure-mode and attack simulation of GE medical device monitoring network ... Normal state, failure-mode and attack simulation of GE medical d...
Normal state, failure-mode and attack simulation of Philips medical device monitoring network. ... Normal state, failure-mode and attack simulation of Philip...
The Real Data Corpus (RDC) is a collection of disk images extracted from secondary storage devices that were acquired from second-hand markets around the wor...
SSLyze scans of POP, IMAP and SMTP related TCP ports, 20,000,000 IP/port combinations, Apr 2015 - August 2015 ... SSLyze results for e-mail related TCP ports...
User-Computer Authentication Events Data ... This anonymized data set encompasses 9 continuous months and represents 708,304,516 successful authentication ev...