Saved datasets
Last updated
Download format
Usage rights
License from data provider
Please review the applicable license to make sure your contemplated use is permitted.
Topic
Free
Cost to access
Described as free to access or have a license that allows redistribution.
100+ datasets found
  1. Comprehensive, Multi-Source Cyber-Security Events Data Set

    • osti.gov
    • search.datacite.org
    Updated May 21, 2015
  2. Most Visited Computer Security Websites

    • similarweb.com
  3. r

    New Generations of Internet of Things Datasets for Cybersecurity...

    • researchdata.edu.au
    Updated 2019
  4. m

    Global Cyber Security Market Research Report- Forecast to 2030

    • marketresearchfuture.com
    Updated Sep 29, 2021
  5. e

    Impact Factors of Journal of Computer Security

    • exaly.com
    csv
    Updated Jun 11, 2022
  6. m

    Healthcare Cyber Security Market Size, Share | Forecast to 2032

    • market.us
    csv, pdf
    Updated Mar 24, 2023
  7. Dataset with cyber attacks in HoneySELK

    • ieee-dataport.org
    • commons.datacite.org
    Updated Sep 3, 2020
  8. e

    Impact Factors of Computer Security Foundations Workshop (CSFW), Proceedings...

    • exaly.com
    csv
    Updated May 2, 2022
  9. Number of cybersecurity professionals worldwide 2022, by country

    • statista.com
    • vikagupta.com
    • +1more
    Updated Apr 14, 2023
  10. m

    Data for: Subduing Cyber Threats to Secure the Financial Sector of...

    • data.mendeley.com
    • b2find.dkrz.de
    • +1more
    Updated Jul 8, 2019
  11. i

    Comprehensive, Multi-Source Cyber-Security Events

    • impactcybertrust.org
    Updated Jan 2, 2015
  12. I

    India Cyber Security Incidents: Total

    • ceicdata.com
  13. Additional computer security parameters in the U.S. 2022

    • statista.com
    Updated Mar 31, 2023
  14. Cyber-security Modbus ICS dataset

    • ieee-dataport.org
    • search.datacite.org
    Updated Jan 31, 2019
  15. Small Business Cyber(Web) Security 2020-2021

    • ieee-dataport.org
    Updated Sep 28, 2020
  16. e

    Impact Factors of International Journal of Information and Computer Security...

    • exaly.com
    csv
    Updated Sep 18, 2022
  17. d

    Cyber Security: A Crisis of Prioritization

    • catalog.data.gov
    • data.amerigeoss.org
    • +1more
    Updated Mar 19, 2023
  18. Types of computer protection methods used by French people 2020

    • statista.com
    Updated Sep 19, 2022
  19. Data from: Cyber security breaches survey 2022

    • gov.uk
    • zv3pb.com
    • +1more
    Updated Jul 11, 2022
  20. m

    10 Point Checklist For Everyone Working Remotely

    • data.mendeley.com
    • b2find.dkrz.de
    • +1more
    Updated Feb 21, 2022
Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Kent, Alexander D. (2015). Comprehensive, Multi-Source Cyber-Security Events Data Set [Dataset]. http://doi.org/10.17021/1179829
Organization logo

Comprehensive, Multi-Source Cyber-Security Events Data Set

Explore at:
28 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 21, 2015
Dataset provided by
United States Department of Energyhttp://energy.gov/
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Authors
Kent, Alexander D.
Area covered
United States
Description

This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory’s corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANL’s network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

Search
Clear search
Close search
Google apps
Main menu