Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtualexercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of theexercise networkin NetJSON format is also provided.
展开▼