Index of /publicDatasets/IoTDatasets/CTU-IoT-Malware-Capture-41-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2019-01-09-22-46-52-192.168.1.196.capinfos2019-01-30 18:23 1.1K 
[   ]2019-01-09-22-46-52-192.168.1.196.dnstop2019-01-30 18:23 958  
[   ]2019-01-09-22-46-52-192.168.1.196.passivedns2019-01-30 18:23 960  
[   ]2019-01-09-22-46-52-192.168.1.196.pcap2019-01-30 18:23 85M 
[TXT]README.html2019-08-19 18:16 2.0K 
[TXT]README.md2019-07-15 14:53 1.5K 
[DIR]bro/2019-03-21 15:51 -  
[   ]d8040a64b88b4a738d333015ddd93a27187abb7584412df56633a7e7d12127f42019-03-21 14:44 10K 

IoT Lab Capture

Description of Files

IP Addresses

- Infected device: 192.168.1.196
- Default GW: 192.168.1.1

Generic Dataset name: CTU-IoT-Malware-Capture-41

Origin device: RPi-03

Timeline

Start. 2018/01/09

Wed Jan 9 22:46:34 CET 2019

Disclaimer

These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz

You need authorization from the Stratosphere Lab to use these files.