PWNJUTSU
收藏IEEE2026-04-17 收录
下载链接:
https://ieee-dataport.org/documents/pwnjutsu
下载链接
链接失效反馈官方服务:
资源简介:
Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available. This dataset is the result of an alternative approach to such issues involved with collecting data. In the PWNJUTSU experiment, 22 Red Teamers attacked the vulnerable infrastructure to compromise machines and steal secret flags. Each Red Teamer operated on a dedicated instance. Sensors captured system logs and network traffic on each of these instances.
提供机构:
JAUME, Mathieu; BERADY, Aimad; VIET TRIEM TONG, Valérie; GUETTE, Gilles



