This is a central metadata index of all of the data available in IMPACT from our federation of Providers.
If you were hoping to find specific data, but didn't please contact us at Contact@ImpactCyberTrust.org and we will see if we can make it available to you.
Note: You must log in to request data.
Synthesized traffic presenting twelve potential insider threat scenarios, six true and six false positives. ... The Insider Threat Data Corpus consists o...
2016 NC Cyber Defense Competition ... These log files are packet captures from the 2016 National Collegiate Cyber Defense Competition (nccdc.org). CCDC i...
This dataset is a comprehensive evaluation of Android botnets, it gathered a large collection of Android botnet samples representing 14 botnet families. ......
A system to built to find the relations between the app on androids. ... This data set wich consist in 72 original apps from different origins, and the follo...
Assessing performance of any detection approach requires experimentation with data that is heterogeneous enough to simulate real traffic to an acceptable lev...
A Labeled Dataset with Botnet, Normal and Background traffic ... The CTU-13 is a dataset of botnet traffic that was captured in the CTU University, Czech Rep...
I-RAM Risk Analytics ... interface to the analytics capability of the Internet Risk Assessment & Mitigation (I-RAM) project for measuring Internet Risk. The...
Traffic Data from Kyoto University's Honeypots ... With the rapid evolution and proliferation of botnets, largescale cyber attacks such as DDoS, spam emails ...
Crawl of the Alexa Top Million domains from October 5-7, 2016 using ZBrowse, a headless Chrome browser instrumented to track object dependencies. ... Crawl o...
User-Computer Authentication Events Data ... This anonymized data set encompasses 9 continuous months and represents 708,304,516 successful authentication ev...