Index of /publicDatasets/IoT-23-Dataset/IndividualScenarios/CTU-IoT-Malware-Capture-34-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2018-12-21-15-50-14-192.168.1.195.capinfos2022-07-16 11:13 1.1K 
[   ]2018-12-21-15-50-14-192.168.1.195.dnstop2022-07-16 11:13 1.6K 
[   ]2018-12-21-15-50-14-192.168.1.195.pcap2019-01-30 17:57 120M 
[TXT]README.html2022-07-16 11:13 2.2K 
[TXT]README.md2022-07-16 11:13 1.6K 
[DIR]bro/2023-12-12 00:55 -  
[DIR]other-pcap/2022-07-16 11:12 -  
[DIR]suricata/2022-07-16 11:13 -  

IoT Lab Capture

Description of Files

IP Addresses

- Infected device: 192.168.1.195
- Default GW: 192.168.1.1

Generic Dataset name: CTU-IoT-Malware-Capture-34

Origin device: RPi02

Timeline

Start. 2018/12/21

Fri Dec 21 15:49:28 CET 2018

Disclaimer

These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz

You need authorization from the Stratosphere Lab to use these files.

Suricata run with rules updated on 2022-07-16