Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Dataset
Contact Us
Dataset
The ultimate goal of our T9 project is to maximize and leverage the AI threat detection model and achieve the utilization and expectations described below. Therefore, we configured a similar service environment and collected network packet logs generated by attacking the vulnerability and the vulnerability, as well as logs generated from the user PC (or server, etc.). Logs were collected using tcpdump and sysmon for Linux and pktmon and sysmon for Windows. These logs can be downloaded through the button below, and you may request about the attack code and environment through "Contact us"
(link)
.
2024
2024_1
Latest date : 2024.07.17
2024_2
Latest date : 2024.12.17
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.