Security

The dataset comprises of several files that contain smart grid communication, namely protocols IEC 60870-104 (IEC 104) and IEC 61850 (MMS) in form of CSV traces. The traces were generated from PCAP files using IPFIX flow probe or an extraction script. CSV traces include the timestamp, IP addresses and ports of communicating devices, and selected IEC 104 and MMS headers that are interesting for security monitoring and anomaly detection. Datasets were by obtained partly by monitoring communication of real ICS devices and partly by monitoring communication of virtual ICS applications.

Categories:
4453 Views

With the large-scale adaptation of Android OS and ever-increasing contributions in the Android application space, Android has become the number one target of malware authors. In recent years, a large number of automatic malware detection and classification systems have evolved to tackle the dynamic nature of malware growth using either static or dynamic analysis techniques. Performance of static malware detection methods degrades due to the obfuscation attacks.

Categories:
1427 Views

This dataset was created by gathering "attack stories" related to IoT devices from the cybersecurity news site Threatpost. Because there aren't many databases of IoT vulnerabilities, we used Threatpost as an index to recent vulnerabilities, which we then researched using a variety of sources, like academic papers, blog posts, code repositories, CVE entries, government and vendor advisories, product release notes, and whitepapers.

Categories:
429 Views

This LoRa-RFFI project builds a LoRa radio frequency fingerprint identification (RFFI) system based on deep learning techniques. The RF signals are collected from 60 commercial-off-the-shelf LoRa devices. The packet preamble part and device labels are provided. The dataset consists of 19 sub-datasets and please refer to the README document for more detailed collection settings for all the sub-datasets.

Categories:
5897 Views

A Dataset Bundle for Building Automation and Control Systems

useful for Security Analysis and to study the normal operation of these systems

This document describes a dataset bundle with diverse types of attacks, and also a not poisoned dataset. The capture was obtained in a real house with a complete Building Automation and Control System (BACS). This document describes the several included datasets and how their data can be employed in security analysis of KNX based building Automation.

Categories:
1413 Views

In this project, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the proposed testbed is organized into seven layers, including, Cloud Computing Layer, Network Functions Virtualization Layer, Blockchain Network Layer, Fog Computing Layer, Software-Defined Networking Layer, Edge Computing Layer, and IoT and IIoT Perception Layer.

Categories:
13739 Views

Power system state estimation (PSSE) plays a vital role in stable operation of modern smart grids, while it is vulnerable to cyber attacks. False data injection attacks (FDIA), one of the most common cyber attacks, can tamper with measurement data and bypass the bad data detection (BDD) mechanism, leading to incorrect PSSE results.

Categories:
848 Views

the most required videos in a multimedia distribution platform are films, TV reality programs, political speeches, sport competitions and music clips.

Categories:
176 Views

Network penetration testing is a complicated step that requires a lot of research and preparation going into it. Once you’ve decided on conducting the procedure, it’s equally important to select a third-party service provider that upholds quality and possesses adequate experience. For this, there are a series of network penetration testing interview questions – and desired answers – you can keep in mind when screening potential service providers.

Categories:
317 Views

It contains the original data corresponding to all simulation diagrams in the paper, including but not limited to the original data of maps, carpooling users, starting points, destinations, and routes.

Categories:
163 Views

Pages