Compromised Software Containers Dataset

2026-01-01T00:22:11+03:00

Compromised Software Containers (COSOCO) Dataset Abstract COSOCO (Compromised Software Containers) is a synthetic dataset of 3364 images representing benign and malware-compromised software containers. Each image in the dataset represents a dockerized software container that has been converted to an image using common byte-to-pixel tools widely used in malware analysis. Software container records are labelled [...]

APT Sandworm Dataset

2025-12-31T23:36:29+03:00

APT Sandworm Dataset Abstract Due to the rise in Advanced Persistent Threat (APT) attacks, modern digital systems and particularly critical infrastructures, must be equipped to counteract these stealthy, multistage intrusions. Unlike simple, isolated attack techniques, APTs are orchestrated by highly skilled adversarial groups that follow strategic, logic-driven plans. These groups employ specific tactics, techniques, [...]

Federated OCPP 1.6 Intrusion Detection Dataset

2025-03-09T15:13:07+03:00

Federated OCPP 1.6 Intrusion Detection Dataset Abstract The recent developments in the field of the Internet of Things (IoT) bring alongside them quite a few advantages. Examples include real-time condition monitoring, remote control and operation and sometimes even remote fault remediation. Still, despite bringing invaluable benefits, IoT-enriched entities inherently suffer from security and privacy [...]

5GC PFCP Intrusion Detection Dataset

2025-02-28T22:28:57+03:00

5GC PFCP Intrusion Detection Dataset The advancements in the field of telecommunications have resulted in an increasing demand for robust, high-speed, and secure connections between User Equipment (UE) instances and the Data Network (DN). The implementation of the newly defined 3rd Generation Partnership Project 3GPP (3GPP) network architecture in the 5G Core (5GC) represents [...]

DNP3 Intrusion Detection Dataset

2025-02-28T22:22:16+03:00

DNP3 Intrusion Detection Dataset In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure technologies. DNP3 is an industrial [...]

IEC 60870-5-104 Intrusion Detection Dataset

2025-03-09T15:12:16+03:00

IEC 60870-5-104 Intrusion Detection Dataset The evolution of the Industrial Internet of Things (IIoT) introduces several benefits, such as real-time monitoring, pervasive control and self-healing. However, despite the valuable services, security and privacy issues still remain given the presence of legacy and insecure communication protocols like IEC 60870-5-104. IEC 60870-5-104 is an industrial protocol widely [...]