five

Defaced web server (Ubuntu 22.04) (simulation)

收藏
ordo.open.ac.uk2024-12-03 更新2025-03-25 收录
下载链接:
https://ordo.open.ac.uk/articles/dataset/Defaced_web_server_Ubuntu_22_04_simulation_/26038669/1
下载链接
链接失效反馈
官方服务:
资源简介:
Simulated network intrusion as part of research to develop artificial intelligence / machine learning for post-breach triage. All information contained within the image (including but not limited to usernames, credit card numbers and IP addresses) is synthetic.Simulated UK-based ecommerce website. As part of the scenario, DVWA (Damned vulnerable web app) was used to simulate coding errors on 28th May 2024. Morning of 6th June 2024 the system was discovered to be defaced. Forensic experts were engaged and a forensic image taken in EnCase E01 format (also known as Expert Witness Format).Many thanks to my PhD supervisors, Prof Adrian Hopgood, Dr Patrick Wong and Dr Ian Kennedy. Thanks also to jmeter, VirtualBox, generatedata.com, Kali Linux, DVWA, GreyNoise.io and many more.For further information, see the README.TXT file. To request ground truth for research purposes, please contact Benjamin Donnachie using benjamin.donnachie@open.ac.uk
提供机构:
ordo.open.ac.uk
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作