Dataset with cyber attacks in HoneySELK

Citation Author(s):
Gildasio
A. de Oliveira Junior
University of Brasília (UnB)
Rafael
T. de Sousa Junior
University of Brasília (UnB)
Robson
de O. Albuquerque
University of Brasília (UnB)
Submitted by:
Gildasio Junior
Last updated:
Thu, 09/03/2020 - 21:05
DOI:
10.21227/kg7v-3490
Data Format:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

Due to the large number of vulnerabilities in information systems and the continuous activity of attackers, techniques for malicious traffic detection are required to identify and protect against cyber-attacks. Therefore, it  is important to intentionally operate a cyber environment to be invaded and compromised in order to allow security professionals to analyze the evolution of the various attacks and exploited vulnerabilities.

This dataset includes 2016, 2017 and 2018 cyber attacks in the HoneySELK environment.

HoneySELK was developed to control, capture, analyze and visualize new and unknown attacks in real time within the research laboratory of the Electrical Engineering Department of the University of Brasília.

 

- Rodrigues, G.A.P.; Albuquerque, R.d.O.; de Deus, F.E.G.; de Sousa, R.T., Jr.; de Oliveira Júnior, G.A. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection. Appl. Sci. 2017, 7, 1082 (https://www.mdpi.com/2076-3417/7/10/1082).

- Oliveira Júnior, G.A.; de Sousa, R.T., Jr.; de Albuquerque, R.O.; Canedo, E.D.; Grégio, A. HoneySELK: Um Ambiente para Pesquisa e Visualização de Ataques Cibernéticos em Tempo Real. In Proceedings of the XVI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, Niteroi, Rio de Janeiro, Brazil, 7–10 November 2016; pp. 697–706 (http://sbseg2016.ic.uff.br/pt/anais.php and https://repositorio.unb.br/handle/10482/22886).

- Oliveira Jr, G. A., Sousa Jr, R. T. de, Tenório, D. F. (2015). Desenvolvimento de um Ambiente Honeynet Virtual para Aplicação Governamental. In: The Ninth International Conference on Forensic Computer Science. v. 1. p. 70-80 (http://www.icofcs.org/2015/papers-published-009.html).

 

Instructions: 

PCAPs contain attacks targeting several honeypots configured with the following protocols/ports:

  - SSH: 22/TCP

  - HTTP: 80/TCP

  - HTTPS: 443/TCP

  - MYSQL: 3306/TCP

  - FTP: 21/20/TCP

  - DNS: 53/TCP/UDP

  - NTP: 123/UDP

  - TELNET: 23/TCP

  - MSRPC: 135/TCP

  - NETBIOS-SSN: 139/TCP

  - MICROSOFT-DS: 445/TCP

Dataset Files

LOGIN TO ACCESS DATASET FILES
Open Access dataset files are accessible to all logged in  users. Don't have a login?  Create a free IEEE account.  IEEE Membership is not required.