Contributors

Rochester Institute of Technology

Resource Type

Dataset

Publisher

RIT Scholarworks

Abstract

This document describes the content of the security traffic datasets included in this collection and the conditions under which the packets were collected. These datasets were assembled from 2023 onward. There will be periodic updates or additions to the dataset collection. The current collection includes a variety of nmap intense scans, an Address Resolution Protocol Man in the Middle (ARP MITM) attack, an Internet Control Message Protocol (ICMP) Redirect MITM and an active directory enumeration attack.

When referencing these datasets, please use the following DOI: 10.57673/gccis-qj60

DOI

10.57673/gccis-qj60

Publication Date

Fall 11-17-2023

Disciplines

Digital Communications and Networking

Format

pdf, txt, pcapng

College

Golisano College of Computing and Information Sciences

Campus

RIT – Main Campus

intense-scan-target-2651.pcapng (299 kB)
nmap scan of Cisco router

intense-scan-target-kali.pcapng (224 kB)
nmap scan of Kali Linux

intense-scan-target-rocky-linux.pcapng (250 kB)
nmap scan of Rockey Linux

intense-scan-target-windows10.pcapng (571 kB)
nmap scan of Windows 10

intense-scan-target-winsvr-2022.pcapng (2756 kB)
nmap scan of Windows Server 2022

Security Dataset Descriptions.pdf (140 kB)
ICMP Redir MITM - final-20240228T200837Z-001.zip (2229 kB)
ARP MITM - final-20240228T201412Z-001.zip (8443 kB)

Share

COinS