首页> 外文期刊>Data in Brief >Traffic and log data captured during a cyber defense exercise
【24h】

Traffic and log data captured during a cyber defense exercise

机译:在网络防御锻炼期间捕获的流量和日志数据

获取原文
获取外文期刊封面目录资料

摘要

Cybersecurity research relies on relevant datasets providing researchers a snapshot of network traffic generated by current users and modern applications and services. The lack of datasets coming from a realistic network environment leads to inefficiency of newly designed methods that are not useful in practice. This data article provides network traffic flows and event logs (Linux and Windows) from a two-day cyber defense exercise involving attackers, defenders, and fictitious users operating in a virtualexercise network. The data are stored as structured JSON, including data schemes and data dictionaries, ready for direct processing. Network topology of theexercise networkin NetJSON format is also provided.
机译:网络安全研究依赖于相关数据集,为研究人员提供了由当前用户和现代应用程序和服务产生的网络流量的快照。来自现实网络环境的缺乏数据集导致新设计方法的低效率无用于实践。此数据文章提供了从涉及在Virtualexercise网络中运行的攻击者,防御者和虚拟用户的为期两天的网络防御练习的网络流量流和事件日志(Linux和Windows)。数据存储为结构化JSON,包括数据方案和数据字典,准备好用于直接处理。还提供了Ipercise Networkin NetJSON格式的网络拓扑。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号