Cargando…
Traffic and log data captured during a cyber defense exercise
Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/ https://www.ncbi.nlm.nih.gov/pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 |
_version_ | 1783547518319067136 |
---|---|
author | Tovarňák, Daniel Špaček, Stanislav Vykopal, Jan |
author_facet | Tovarňák, Daniel Špaček, Stanislav Vykopal, Jan |
author_sort | Tovarňák, Daniel |
collection | PubMed |
description | Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtual exercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of the exercise network in NetJSON format is also provided. |
format | Online Article Text |
id | pubmed-7300108 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-73001082020-06-22 Traffic and log data captured during a cyber defense exercise Tovarňák, Daniel Špaček, Stanislav Vykopal, Jan Data Brief Computer Science Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtual exercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of the exercise network in NetJSON format is also provided. Elsevier 2020-05-29 /pmc/articles/PMC7300108/ /pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 Text en © 2020 The Authors http://creativecommons.org/licenses/by/4.0/ This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Computer Science Tovarňák, Daniel Špaček, Stanislav Vykopal, Jan Traffic and log data captured during a cyber defense exercise |
title | Traffic and log data captured during a cyber defense exercise |
title_full | Traffic and log data captured during a cyber defense exercise |
title_fullStr | Traffic and log data captured during a cyber defense exercise |
title_full_unstemmed | Traffic and log data captured during a cyber defense exercise |
title_short | Traffic and log data captured during a cyber defense exercise |
title_sort | traffic and log data captured during a cyber defense exercise |
topic | Computer Science |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/ https://www.ncbi.nlm.nih.gov/pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 |
work_keys_str_mv | AT tovarnakdaniel trafficandlogdatacapturedduringacyberdefenseexercise AT spacekstanislav trafficandlogdatacapturedduringacyberdefenseexercise AT vykopaljan trafficandlogdatacapturedduringacyberdefenseexercise |