Dataset Details: Malicious Network traffic PCAPS and binary image visualization

Dataset Information

Serial Number: 105

Year: 2021

Kind of Traffic: Simulated + Real

Publicly Available: No

Count of Records: 125MB

Features Count:

CITE

No. of citations: 43

Attack Type: DDoS, backdoor, bruteforce, etc

Download Links: Not Available

Abstract: Rosa et.al presented malicious network traffic Pcaps and binary image visualization. This dataset offers a carefully selected assortment of PCAP files obtained from actual malware traffic detected in a virtualized smart home setting within the Cyber-Trust testbed. The (SOHO) smart home setup comprises virtualized devices organized into distinct groups, with each group facilitated by a separate Ubuntu VM acting as the gateway. The dataset contains curated PCAP files originating from various authentic attack scenarios, including zero-day exploits, DDoS assaults leveraging Mirai and Black Energy botnets, infections by Zeus malware on Linux and Windows platforms, Java-RMI and distcc exec backdoors, UnrealIRCD backdoors, Web Tomcat exploits, Ruby DRb code execution, Hydra FTP and SSH brute force attacks, SMTP user enumeration, and NetBIOS-SSN incidents. PCAP files were created by executing live demonstrations of each attack scenario and capturing inter-device network communication using tcpdump. Furthermore, captures of regular network traffic were acquired from unaffected devices through routine network tasks, like file transfers, SSH sessions, media streaming, and API interactions, reflecting typical behavior within a smart home network

Back to Datasets