Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
comming soon
Dataset
Contact Us
Dataset
The ultimate goal of our T9 project is to maximize and leverage the AI threat detection model and achieve the utilization and expectations described below. Therefore, we configured a similar service environment and collected network packet logs generated by attacking the vulnerability and the vulnerability, as well as logs generated from the user PC (or server, etc.). Logs were collected using tcpdump and sysmon for Linux and pktmon and sysmon for Windows. These logs can be downloaded through the button below, and you may request about the attack code and environment through "Contact us"
(link)
.
2024
T1-24–01–S–N–CL
Latest date : 2024.07.17
T2-24–01–S–N–CL
Latest date : 2024.07.17
T3-24–01–S–N–CL
Latest date : 2024.07.17
T4-24–01–S–E–M
Latest date : 2024.07.17
T5-24–01–S–E–LM
Latest date : 2024.07.17
T6-24–01–S–E–FH
Latest date : 2024.07.17
T7-24–01–M–NE–CLM
Latest date : 2024.07.17
T8-24–01–M–NE–CFHL
Latest date : 2024.07.17
T9-24–01–M–NE–CLM
Latest date : 2024.07.17
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.