This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
2015 NC Cyber Defense Competition ... These log files are packet captures from the 2015 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
2017 NC Cyber Defense Competition ... These log files are packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
Non-anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Non-anonymized database pertaining to the AlphaBay marketplace. This data ...
Non-anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Non-anonymized database pertaining to th...
Anonymized data for the AlphaBay online anonymous marketplace (2014-2017) ... "Anonymized database pertaining to the AlphaBay marketplace. This data was used...
Non-anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... "Non-anonymized subset of the databa...
Anonymized data for the Dream, Traderoute, Berlusconi and Valhalla online anonymous marketplaces (2017-2018) ... Anonymized data for the Dream, Traderoute, B...
Anonymized data for the paper Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem ... Anonymized data for the paper Measuring ...
Android Adware and General Malware Dataset ... The AAGM dataset is captured by installing the Android apps on the real smartphones semi-automated. The datase...
DoS attacks dataset ... In this study the focus was on the universal type of application DoS slow-rate attacks that are often seen in two variations: slow se...
This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory's corporate, inter...
Cyber threat Indicators ... In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicat...
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
...
Cyber Threat Indicators ... AIS STIX Profile (https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf).
A labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files ... The ember dataset is a ...
Anonymized data for the Hansa online anonymous marketplace (2015-2017) ... Anonymized database pertaining to the Hansa marketplace. This data was used in the...
Non-anonymized data for the Hansa online anonymous marketplace (2015-2017) ... "Non-anonymized database pertaining to the Hansa marketplace. This data was us...
The Honeynet Project goal is to improve Internet security by sharing lessons learned about the most common threats. The Honeynet project deploys honeynets al...
The CICIDS2017 dataset consists of labeled network flows, including full packet payloads in pcap format, the corresponding profiles and the labeled flows (Ge...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
SSLyze scans of POP, IMAP and SMTP related TCP ports, 20,000,000 IP/port combinations, Apr 2015 - August 2015 ... SSLyze results for e-mail related TCP ports...