Cargando…

Traffic and log data captured during a cyber defense exercise

Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful...

Descripción completa

Detalles Bibliográficos
Autores principales: Tovarňák, Daniel, Špaček, Stanislav, Vykopal, Jan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/
https://www.ncbi.nlm.nih.gov/pubmed/32577444
http://dx.doi.org/10.1016/j.dib.2020.105784
_version_ 1783547518319067136
author Tovarňák, Daniel
Špaček, Stanislav
Vykopal, Jan
author_facet Tovarňák, Daniel
Špaček, Stanislav
Vykopal, Jan
author_sort Tovarňák, Daniel
collection PubMed
description Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtual exercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of the exercise network in NetJSON format is also provided.
format Online
Article
Text
id pubmed-7300108
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-73001082020-06-22 Traffic and log data captured during a cyber defense exercise Tovarňák, Daniel Špaček, Stanislav Vykopal, Jan Data Brief Computer Science Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtual exercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of the exercise network in NetJSON format is also provided. Elsevier 2020-05-29 /pmc/articles/PMC7300108/ /pubmed/32577444 http://dx.doi.org/10.1016/j.dib.2020.105784 Text en © 2020 The Authors http://creativecommons.org/licenses/by/4.0/ This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Computer Science
Tovarňák, Daniel
Špaček, Stanislav
Vykopal, Jan
Traffic and log data captured during a cyber defense exercise
title Traffic and log data captured during a cyber defense exercise
title_full Traffic and log data captured during a cyber defense exercise
title_fullStr Traffic and log data captured during a cyber defense exercise
title_full_unstemmed Traffic and log data captured during a cyber defense exercise
title_short Traffic and log data captured during a cyber defense exercise
title_sort traffic and log data captured during a cyber defense exercise
topic Computer Science
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7300108/
https://www.ncbi.nlm.nih.gov/pubmed/32577444
http://dx.doi.org/10.1016/j.dib.2020.105784
work_keys_str_mv AT tovarnakdaniel trafficandlogdatacapturedduringacyberdefenseexercise
AT spacekstanislav trafficandlogdatacapturedduringacyberdefenseexercise
AT vykopaljan trafficandlogdatacapturedduringacyberdefenseexercise