Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
India Cyber Security Incidents: Website Intrusion and Malware Propagation data was reported at 563.000 Unit in 2017. This records a decrease from the previous number of 1,483.000 Unit for 2016. India Cyber Security Incidents: Website Intrusion and Malware Propagation data is updated yearly, averaging 4,492.500 Unit from Dec 2008 (Median) to 2017, with 10 observations. The data reached an all-time high of 7,286.000 Unit in 2014 and a record low of 563.000 Unit in 2017. India Cyber Security Incidents: Website Intrusion and Malware Propagation data remains active status in CEIC and is reported by Indian Computer Emergency Response Team. The data is categorized under India Premium Database’s Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
India Cyber Security Incidents: Virus or Malicious Code data was reported at 9,750.000 Unit in 2017. This records a decrease from the previous number of 13,371.000 Unit for 2016. India Cyber Security Incidents: Virus or Malicious Code data is updated yearly, averaging 2,791.000 Unit from Dec 2004 (Median) to 2017, with 14 observations. The data reached an all-time high of 13,371.000 Unit in 2016 and a record low of 5.000 Unit in 2004. India Cyber Security Incidents: Virus or Malicious Code data remains active status in CEIC and is reported by Indian Computer Emergency Response Team. The data is categorized under India Premium Database’s Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents.
This statistic shows the number of computer misuse fraud offences by type recorded in England and Wales in the years ending March 2017 and March 2018. Computer viruses and malware cases fell sharply from *** thousand cases in the year ending March 2017, to *** thousand in the year ending March 2018.
In 2023, the estimated number of distributed denial-of-service (DDoS) cyberattacks in Italy was of approximately ******. This represents a decrease from the ***** attacks registered in 20212. In 2019 and 2020, the country registered the peak of DDoS attacks, with over ****** cyberattacks reported.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Cyber Security Incidents: Website Intrusion and Malware Propagation在2017达563.000 单位,相较于2016的1,483.000 单位有所下降。Cyber Security Incidents: Website Intrusion and Malware Propagation数据按每年更新,2008至2017期间平均值为4,492.500 单位,共10份观测结果。该数据的历史最高值出现于2014,达7,286.000 单位,而历史最低值则出现于2017,为563.000 单位。CEIC提供的Cyber Security Incidents: Website Intrusion and Malware Propagation数据处于定期更新的状态,数据来源于Indian Computer Emergency Response Team,数据归类于India Premium Database的Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents。
As of August 2024, internet users worldwide discovered 52,000 new common IT security vulnerabilities and exposures (CVEs). The highest reported annual figure was recorded in 2023, over 29,000. Global ransomware threats In the past couple of years, ransomware has become more prominent, becoming the most frequently reported type of cyberattack worldwide in 2023. Additionally, 39 percent of organizations worldwide reported experiencing one to three ransomware infections. Among researched markets, France and South Africa were impacted the most. Costly and efficient ransomware families, such as StopCrypt and LockBit, ranked first by detections globally. Additionally, the 2017 WannaCry attack still holds the record as the most impactful ransomware event, causing an estimated four billion U.S. dollars in damages. Manufacturing and ransomware Manufacturing remains one of the most targeted industries for cyberattacks. In 2023, it was the most vulnerable sector globally to ransomware, experiencing approximately 638 incidents worldwide. These attacks were especially prevalent in industrial organizations in North America. Additionally, malware and network or application anomalies were among the most common types of cyber incidents affecting manufacturing organizations.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Cyber Security Incidents: Virus or Malicious Code在2017达9,750.000 单位,相较于2016的13,371.000 单位有所下降。Cyber Security Incidents: Virus or Malicious Code数据按每年更新,2004至2017期间平均值为2,791.000 单位,共14份观测结果。该数据的历史最高值出现于2016,达13,371.000 单位,而历史最低值则出现于2004,为5.000 单位。CEIC提供的Cyber Security Incidents: Virus or Malicious Code数据处于定期更新的状态,数据来源于Indian Computer Emergency Response Team,数据归类于India Premium Database的Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents。
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Network traffic datasets created by Single Flow Time Series Analysis
Datasets were created for the paper: Network Traffic Classification based on Single Flow Time Series Analysis -- Josef Koumar, Karel Hynek, Tomáš Čejka -- which was published at The 19th International Conference on Network and Service Management (CNSM) 2023. Please cite usage of our datasets as:
J. Koumar, K. Hynek and T. Čejka, "Network Traffic Classification Based on Single Flow Time Series Analysis," 2023 19th International Conference on Network and Service Management (CNSM), Niagara Falls, ON, Canada, 2023, pp. 1-7, doi: 10.23919/CNSM59352.2023.10327876.
This Zenodo repository contains 23 datasets created from 15 well-known published datasets which are cited in the table below. Each dataset contains 69 features created by Time Series Analysis of Single Flow Time Series. The detailed description of features from datasets is in the file: feature_description.pdf
In the following table is a description of each dataset file:
File name | Detection problem | Citation of original raw dataset |
botnet_binary.csv | Binary detection of botnet | S. García et al. An Empirical Comparison of Botnet Detection Methods. Computers & Security, 45:100–123, 2014. |
botnet_multiclass.csv | Multi-class classification of botnet | S. García et al. An Empirical Comparison of Botnet Detection Methods. Computers & Security, 45:100–123, 2014. |
cryptomining_design.csv | Binary detection of cryptomining; the design part | Richard Plný et al. Datasets of Cryptomining Communication. Zenodo, October 2022 |
cryptomining_evaluation.csv | Binary detection of cryptomining; the evaluation part | Richard Plný et al. Datasets of Cryptomining Communication. Zenodo, October 2022 |
dns_malware.csv | Binary detection of malware DNS | Samaneh Mahdavifar et al. Classifying Malicious Domains using DNS Traffic Analysis. In DASC/PiCom/CBDCom/CyberSciTech 2021, pages 60–67. IEEE, 2021. |
doh_cic.csv | Binary detection of DoH |
Mohammadreza MontazeriShatoori et al. Detection of doh tunnels using time-series classification of encrypted traffic. In DASC/PiCom/CBDCom/CyberSciTech 2020, pages 63–70. IEEE, 2020 |
doh_real_world.csv | Binary detection of DoH | Kamil Jeřábek et al. Collection of datasets with DNS over HTTPS traffic. Data in Brief, 42:108310, 2022 |
dos.csv | Binary detection of DoS | Nickolaos Koroniotis et al. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst., 100:779–796, 2019. |
edge_iiot_binary.csv | Binary detection of IoT malware | Mohamed Amine Ferrag et al. Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications: Centralized and federated learning, 2022. |
edge_iiot_multiclass.csv | Multi-class classification of IoT malware | Mohamed Amine Ferrag et al. Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications: Centralized and federated learning, 2022. |
https_brute_force.csv | Binary detection of HTTPS Brute Force | Jan Luxemburk et al. HTTPS Brute-force dataset with extended network flows, November 2020 |
ids_cic_binary.csv | Binary detection of intrusion in IDS | Iman Sharafaldin et al. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018. |
ids_cic_multiclass.csv | Multi-class classification of intrusion in IDS | Iman Sharafaldin et al. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018. |
ids_unsw_nb_15_binary.csv | Binary detection of intrusion in IDS | Nour Moustafa and Jill Slay. Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE, 2015. |
ids_unsw_nb_15_multiclass.csv | Multi-class classification of intrusion in IDS | Nour Moustafa and Jill Slay. Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In 2015 military communications and information systems conference (MilCIS), pages 1–6. IEEE, 2015. |
iot_23.csv | Binary detection of IoT malware | Sebastian Garcia et al. IoT-23: A labeled dataset with malicious and benign IoT network traffic, January 2020. More details here https://www.stratosphereips.org /datasets-iot23 |
ton_iot_binary.csv | Binary detection of IoT malware | Nour Moustafa. A new distributed architecture for evaluating ai-based security systems at the edge: Network ton iot datasets. Sustainable Cities and Society, 72:102994, 2021 |
ton_iot_multiclass.csv | Multi-class classification of IoT malware | Nour Moustafa. A new distributed architecture for evaluating ai-based security systems at the edge: Network ton iot datasets. Sustainable Cities and Society, 72:102994, 2021 |
tor_binary.csv | Binary detection of TOR | Arash Habibi Lashkari et al. Characterization of Tor Traffic using Time based Features. In ICISSP 2017, pages 253–262. SciTePress, 2017. |
tor_multiclass.csv | Multi-class classification of TOR | Arash Habibi Lashkari et al. Characterization of Tor Traffic using Time based Features. In ICISSP 2017, pages 253–262. SciTePress, 2017. |
vpn_iscx_binary.csv | Binary detection of VPN | Gerard Draper-Gil et al. Characterization of Encrypted and VPN Traffic Using Time-related. In ICISSP, pages 407–414, 2016. |
vpn_iscx_multiclass.csv | Multi-class classification of VPN | Gerard Draper-Gil et al. Characterization of Encrypted and VPN Traffic Using Time-related. In ICISSP, pages 407–414, 2016. |
vpn_vnat_binary.csv | Binary detection of VPN | Steven Jorgensen et al. Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification. CoRR, abs/2205.05628, 2022 |
vpn_vnat_multiclass.csv | Multi-class classification of VPN | Steven Jorgensen et al. Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification. CoRR, abs/2205.05628, 2022 |
As of August 2024, internet users worldwide discovered around ****** new common IT security vulnerabilities and exposures (CVEs). The highest reported annual figure was recorded in 2023, over ******. Global ransomware threats In the past couple of years, ransomware has become more prominent, becoming the most frequently reported type of cyberattack worldwide in 2023. Additionally, ** percent of organizations worldwide reported experiencing one to three ransomware infections. Among researched markets, France and South Africa were impacted the most. Costly and efficient ransomware families, such as StopCrypt and LockBit, ranked first by detections globally. Additionally, the 2017 WannaCry attack still holds the record as the most impactful ransomware event, causing an estimated **** billion U.S. dollars in damages. Manufacturing and ransomware Manufacturing remains one of the most targeted industries for cyberattacks. In 2023, it was the most vulnerable sector globally to ransomware, experiencing approximately *** incidents worldwide. These attacks were especially prevalent in industrial organizations in North America. Additionally, malware and network or application anomalies were among the most common types of cyber incidents affecting manufacturing organizations.
Stop Summary files represent average daily ridership at the stop level over the course of a sign-up period. The data is calculated from a variety of sources depending on the route and year. This data provides a basic geographic overview of SEPTA’s ridership. These data files represent average daily fall ridership from 2014 – present. Accurate weekend data was not available until 2017 at which point SEPTA had more widespread APC coverage. No data is available from the Fall of 2020 due to the malware attack. APC data was not available for articulated vehicles and the Boulevard Direct from August 2020 through February 2022 due to the malware attack.
According to a survey conducted in Indonesia in April 2019, **** percent of respondents who had internet access on their devices stated that they had encountered a virus before. With over *** million internet users, Indonesia is one of the biggest online markets worldwide. As of March 2017, online penetration in the country stood at only slightly over ** percent. Popular online activities include mobile messaging and social media.
Kaspersky Lab reported a global revenue of ****** million U.S. dollars in 2024, which was the highest figure over the observed period. Kaspersky Lab is Russia's highest-earning information security provider, followed by Gazinformservice and Softline. Antivirus market in Russia The two major antivirus providers among Russian companies are Kaspersky Lab and Doctor Web. Both are listed in the Russian registry of national software vendors, which means that their products can be supplied to state institutions. As of August 2021, Kaspersky Lab was one of the leading Windows anti-malware application vendors. Doctor Web focuses on making the information security industry within Russia independent from imports. Several foreign brands, such as Avast, Bitdefender, Eset, and Norton, stopped operating in Russia over its invasion of Ukraine in 2022. Kaspersky Lab ban on U.S. government computers The U.S. Department of Homeland Security suspected Kaspersky Lab of cooperating with Russian security authorities in 2017, subsequently prohibiting its use on computers within the government. In March 2022, the company was claimed to be presenting a threat to national security of the U.S. That meant that U.S. companies could not use the Universal Service Fund to buy Kaspersky Lab products. The fund is generally used to provide communications services for low-income customers, schools, and libraries, among others.
Not seeing a result you expected?
Learn how you can add new datasets to our index.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
India Cyber Security Incidents: Website Intrusion and Malware Propagation data was reported at 563.000 Unit in 2017. This records a decrease from the previous number of 1,483.000 Unit for 2016. India Cyber Security Incidents: Website Intrusion and Malware Propagation data is updated yearly, averaging 4,492.500 Unit from Dec 2008 (Median) to 2017, with 10 observations. The data reached an all-time high of 7,286.000 Unit in 2014 and a record low of 563.000 Unit in 2017. India Cyber Security Incidents: Website Intrusion and Malware Propagation data remains active status in CEIC and is reported by Indian Computer Emergency Response Team. The data is categorized under India Premium Database’s Transportation, Post and Telecom Sector – Table IN.TF010: Information Technology Statistics: Cyber Security Incidents.