Cloud Intrusion Detection Dataset

  • Home
  • LACS
  • CIDD Architecture
  • Base Network
  • Graphs
  • Comparison
  • Downloads
  • About Us
Graphs for real time Masquerades, Host based, and Network based attack distribution
 
  • Attacks in test data(Solaris& TCPdump)audits Part1
  • Attacks in test data(Windows, TCPdump)audits Part2
  • Masquerade distribution in Solaris and Windows audits
  • Training attack patterns in Solaris-Win-TCPdump,Part1,2

 

OUR Log Analyzer and Correlator Architecture

  • CIDS log analyzer and Correlator

 

Snapshots for CIDS Windows Auditing Data

  • A snaphsot of testing Data of Week4
  • A snapshot for trainig data for windows Security audits of Week1
  • A snapshot for attack Distribution in testing data of Week 4
  • A snapshot for training data(sequence of mail and web service)
  • A snapshots for users Training login sessions

 

Snapshots for TCPdump data with labeled attacks

  • A snaphshot of free TCP data attack in training data Day1 in week1
  • A snaphshot of tcp-dump data with labeled attacks in training data of Day1 in week5
  Snapshots for CIDS Solaris Auditing Data
  • A snapshot for one day testing solaris data -Day1Week6
  • A snapshot for one day Trainig solaris audit data -Day1Week1
  • Final Solaris Audit statistics For all users in our CIDS Dataset
 

All Copyrights Reserved @ CIDD