• Home
  • Attack
  • Dataset
  • Contact Us
        • T1-24–01–S–N–CL
        • T2-24–01–S–N–CL
        • T3-24–01–S–N–CL
        • T4-24–01–S–E–M
        • T5-24–01–S–E–LM
        • T6-24–01–S–E–FH
        • T7-24–01–M–NE–CLM
        • T8-24–01–M–NE–CFHL
        • T9-24–01–M–NE–CLM
        • T1-24–02–S–N–CIKM
        • T2-24–02–S–N–CL
        • T3-24–02–S–N–CL
        • T4-24-02-S-E-M
        • T5-24-02-S-E-DL
        • T6-24-02-S-E-DEGN
        • T7-24-02-M-NE-CDEGLN
        • T8-24-02-M-NE-CDL
        • T9-24-02-M-NE-CLH
  • Dataset
  • The ultimate goal of our T9 project is to maximize and leverage the AI ​​threat detection model and achieve the utilization and expectations described below. Therefore, we configured a similar service environment and collected network packet logs generated by attacking the vulnerability and the vulnerability, as well as logs generated from the user PC (or server, etc.). Logs were collected using tcpdump and sysmon for Linux and pktmon and sysmon for Windows. These logs can be downloaded through the button below, and you may request about the attack code and environment through "Contact us" (link).
  •  

  • 2024

    • 2024_1 Latest date : 2024.07.17
      2024_2 Latest date : 2024.12.17
  • Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.