Serial Number: 16
Year: 2010
Kind of Traffic: Simulated
Publicly Available: Yes
Count of Records: 223585 count
Features Count: 30
No. of citations: 82
Attack Type: SQL injection, buffer overflow, etc
Download Links: https://impactcybertrust.org/dataset_view?idDataset=940
Abstract: CSIC HTTP 2010 dataset was generated at “Information security institute” of CSIC (Spanish Research national council) and is available to public. It was captured from live network environment in 2010. In this dataset traffic were generated from e-commerce web application, where users can register themselves using their personal information and buy things using shopping cart. This dataset comprises 36k normal requests & 25k anomalous requests. The requests of HTTP are labelled as anomalous or normal. The attacks in this dataset are buffer overflow, SQL injection, information gathering, CRLF injection, files disclosure, XSS, server side include, parameter tampering etc. There are 3 types of anomalous requests: static attacks (it requests hidden resources), dynamic attacks (it modifies request arguments which are valid), unintentionally illegal requests (they do not have malicious intention, but also do not follow normal behaviour of web application). Paros & W3AF tools were used to generate attacks. The dataset is divided into 3 sets: training phase (has normal traffic) and two sets for test phase (one with normal traffic & other with malicious traffic)