User Tools

Site Tools


artefacts

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
artefacts [2018/05/17 19:13] – [Research using our data] lallodiartefacts [2019/11/25 12:48] gdupont
Line 23: Line 23:
 | MALMARKET | Unstructured dataset with the dumps of the market forum interactions (in Russian) spawning from the CVE trading reported in MALMARKET_VULNS.| [[https://arxiv.org/abs/1708.04866|L. Allodi (ACM CCS 2017)]]| Ad hoc collaborations | Send a short (max 1 page) research proposal to [[http://www.win.tue.nl/~lallodi|Dr. L. Allodi]]| | MALMARKET | Unstructured dataset with the dumps of the market forum interactions (in Russian) spawning from the CVE trading reported in MALMARKET_VULNS.| [[https://arxiv.org/abs/1708.04866|L. Allodi (ACM CCS 2017)]]| Ad hoc collaborations | Send a short (max 1 page) research proposal to [[http://www.win.tue.nl/~lallodi|Dr. L. Allodi]]|
 | Cryptx | PCAP files of the Cryptx ransomware | to come | Direct download | [[https://surfdrive.surf.nl/files/index.php/s/16YYD5fWVBVFwEk|Cryptx PCAP]] (approx. 700MB)| | Cryptx | PCAP files of the Cryptx ransomware | to come | Direct download | [[https://surfdrive.surf.nl/files/index.php/s/16YYD5fWVBVFwEk|Cryptx PCAP]] (approx. 700MB)|
-| Jigsaw | PCAP files of the Jigsaw ransomware | to come | Direct download | [[https://surfdrive.surf.nl/files/index.php/s/cXKpOD6XcOozQ2Z|Jigsaw PCAP]] (approx. 1GB)| +| Jigsaw | PCAP files of the Jigsaw ransomware | to come | Direct download | [[https://surfdrive.surf.nl/files/index.php/s/cXKpOD6XcOozQ2Z|Jigsaw PCAP]] (approx. 1GB)
 +| Automotive Controller Area Network (CAN) Bus Intrusion Dataset| CAN bus datasets from three systems: two cars (Opel Astra and Renault Clio) and a CAN bus prototype we built ourselves. For each system there are files consisting in normal data and attack data. The purpose is meant to evaluate CAN bus Network Intrusion Detection Systems (NIDS). See READMEs in folders for more details. CAN bus NIDS implementations can be obtained upon requests via email.| G. Dupont et al. (IEEE ICCVE 2019) | Direct download | [[https://doi.org/10.4121/uuid:b74b4928-c377-4585-9432-2004dfa20a5d|Datasets]]
 ==== Research using our data ==== ==== Research using our data ====
  
Line 29: Line 30:
 |[[http://robinson.gsu.edu/profile/dmitry-zhdanov/| Dmitry Zhdanov]] | [[http://robinson.gsu.edu|Georgia State University]]     | This dataset will be used to renareh supply and demand dynamics of dark markets over time. Our aoal is to verify economic dynamics model with these data. | | |[[http://robinson.gsu.edu/profile/dmitry-zhdanov/| Dmitry Zhdanov]] | [[http://robinson.gsu.edu|Georgia State University]]     | This dataset will be used to renareh supply and demand dynamics of dark markets over time. Our aoal is to verify economic dynamics model with these data. | |
 |[[http://www.dcc.ufrj.br/~sadoc/| Daniel Sadoc Menasche]] | [[https://ufrj.br|Universidade Federal do Rio de Janeiro - UFRJ]]     | The goal of our project is to contrast findings from different black markets. | | |[[http://www.dcc.ufrj.br/~sadoc/| Daniel Sadoc Menasche]] | [[https://ufrj.br|Universidade Federal do Rio de Janeiro - UFRJ]]     | The goal of our project is to contrast findings from different black markets. | |
-|[[| Pierre Trepagnier]] | Undisclosed (USA) | Utilizing traded black market exploits as one of a set of possible predictors indicating host risk of compromise. | |+|[[https://www.ll.mit.edu/mission/cybersec/cybersec-bios/trepagnier-bio.html | Pierre Trepagnier]] |  | Utilizing traded black market exploits as one of a set of possible predictors indicating host risk of compromise. | |
artefacts.txt · Last modified: 2023/10/13 12:31 by mcampobasso