Index of /publicDatasets/IoT-23-Dataset/IndividualScenarios/CTU-IoT-Malware-Capture-43-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]suricata/2022-07-16 11:49 -  
[DIR]labeled/2021-07-10 22:13 -  
[DIR]bro/2022-07-16 13:02 -  
[TXT]README.md2022-07-16 11:49 1.6K 
[TXT]README.html2022-07-16 13:02 2.3K 
[   ]2019-01-10-19-22-51-192.168.1.198.pcap2019-01-30 18:28 5.9G 
[   ]2019-01-10-19-22-51-192.168.1.198.dnstop2022-07-16 11:38 1.6K 
[   ]2019-01-10-19-22-51-192.168.1.198.capinfos2022-07-16 11:51 1.1K 

IoT Lab Capture

Description of Files

IP Addresses

- Infected device: 192.168.1.198
- Default GW: 192.168.1.1

Generic Dataset name: CTU-IoT-Malware-Capture-43

Origin device: RPi-05

Timeline

Start. 2018/01/10

## Thu Jan 10 19:22:33 CET 2019

Poweroff

##Thu Jan 10 20:27:33 CET 2019

Disclaimer

These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz

You need authorization from the Stratosphere Lab to use these files.

Suricata run with rules updated on 2022-07-16