Traffic and Log Data Captured During a Cyber Defense Exercise

Investor logo
Authors

TOVARŇÁK Daniel ŠPAČEK Stanislav VYKOPAL Jan

Year of publication 2020
Type Article in Periodical
Magazine / Source Data in Brief
MU Faculty or unit

Institute of Computer Science

Citation
Web https://doi.org/10.1016/j.dib.2020.105784
Doi http://dx.doi.org/10.1016/j.dib.2020.105784
Keywords cybersecurity; cyber defense exercise; network traffic; network flow; event log; syslog; KYPO
Attached files
Description Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtual exercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of the exercise network in NetJSON format is also provided.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info