31 datasets found
  1. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  2. a

    CrackStation's Password Cracking Dictionary

    • academictorrents.com
    bittorrent
    Updated Mar 22, 2018
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Defuse Security (2018). CrackStation's Password Cracking Dictionary [Dataset]. https://academictorrents.com/details/fd62cc1d79f595cbe1de6356fb13c2165994e469
    Explore at:
    bittorrent(4500756826)Available download formats
    Dataset updated
    Mar 22, 2018
    Dataset authored and provided by
    Defuse Security
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago. The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. Lines are separated with a newline " " character. You can test the list without downloading it by giving SHA256 hashes to the free hash cracker or to @PlzCrack on twitter. Here s a tool for computing hashes easily. Here are the results of cracking LinkedIn s and eHarmony s password hash leaks with the list. The list is responsible for cracking about 30% of all hashes given to CrackStation s free hash cracker, but that figure should be taken with a grain of salt because s

  3. D

    Password Recovery Software Market Report | Global Forecast From 2025 To 2033...

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Password Recovery Software Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-password-recovery-software-market
    Explore at:
    pptx, pdf, csvAvailable download formats
    Dataset updated
    Jan 7, 2025
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Password Recovery Software Market Outlook



    The global password recovery software market size was valued at USD 1.2 billion in 2023 and is expected to reach approximately USD 2.8 billion by 2032, growing at a compound annual growth rate (CAGR) of 9.5% from 2024 to 2032. A significant growth factor propelling the market is the increasing prevalence of cyber-attacks and data breaches, which necessitate robust password recovery solutions.



    The growing occurrence of cybersecurity threats has significantly influenced the demand for password recovery software. Enterprises across various sectors, particularly in sensitive domains such as BFSI and healthcare, are increasingly opting for sophisticated recovery solutions to safeguard their data integrity and ensure continuity. This heightened demand is driven by the necessity to prevent unauthorized access and mitigate data loss, evidencing a strong market trajectory for password recovery solutions.



    Technological advancements, such as the integration of artificial intelligence and machine learning into password recovery software, have further accelerated market growth. These innovations enhance the efficiency and reliability of software, making it more adept at handling complex password recovery scenarios. Additionally, the proliferation of multi-factor authentication and biometric verification methods is contributing to the evolving landscape of password recovery solutions, offering more secure and user-friendly experiences.



    Another pivotal growth factor is the rising adoption of cloud computing and the increasing shift towards digital transformation initiatives by businesses worldwide. Cloud-based password recovery solutions offer scalability, cost-efficiency, and ease of deployment, appealing to organizations seeking to enhance their cybersecurity frameworks. Moreover, as more companies transition to remote working models, the need for robust and accessible password recovery tools has become more pronounced.



    In today's digital landscape, the importance of File Recovery Software cannot be overstated. As organizations increasingly rely on digital data, the risk of accidental deletions, hardware failures, and cyber-attacks looms large. File recovery software serves as a critical tool in retrieving lost or corrupted files, ensuring business continuity and data integrity. These solutions are equipped with advanced algorithms that can recover a wide range of file types, from documents and images to databases and system files. As businesses continue to amass vast amounts of data, the demand for efficient and reliable file recovery solutions is expected to grow, paralleling the trends seen in password recovery software.



    Regionally, North America held the largest market share in 2023, attributed to the early adoption of advanced cybersecurity measures and the presence of key market players. However, the Asia Pacific region is expected to witness the highest growth rate during the forecast period. Factors such as rapid digitalization, increasing internet penetration, and the rising number of small and medium enterprises (SMEs) are driving the demand for password recovery software in this region.



    Component Analysis



    The password recovery software market is segmented by component into software and services. The software segment is projected to dominate the market during the forecast period, driven by the continuous advancements in technology and the need for automated solutions to manage password-related issues. Software solutions offer a wide range of functionalities, including password reset tools, recovery protocols, and integration with existing IT infrastructure, making them indispensable for modern enterprises.



    Within the software segment, enterprise password management tools are gaining traction due to their ability to streamline password recovery processes and reduce the administrative burden on IT departments. These tools often come equipped with features such as self-service password reset, policy enforcement, and audit trails, ensuring compliance with regulatory standards. The growing emphasis on enhancing user experience and minimizing downtime is further bolstering the demand for sophisticated software solutions.



    On the other hand, the services segment encompasses consulting, implementation, and maintenance services. As organizations increasingly recognize the importance of tailored solutions and continuous support,

  4. NIST NLTE-4 Plasma Population Kinetics Database

    • datasets.ai
    • res1catalogd-o-tdatad-o-tgov.vcapture.xyz
    • +2more
    21
    Updated Aug 6, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Institute of Standards and Technology (2024). NIST NLTE-4 Plasma Population Kinetics Database [Dataset]. https://datasets.ai/datasets/nist-nlte-4-plasma-population-kinetics-database-99df6
    Explore at:
    21Available download formats
    Dataset updated
    Aug 6, 2024
    Dataset authored and provided by
    National Institute of Standards and Technologyhttp://www.nist.gov/
    Description

    This database contains benchmark results for simulation of plasma population kinetics and emission spectra. The data were contributed by the participants of the 4th Non-LTE Code Comparison Workshop who have unrestricted access to the database. The only limitation for other users is in hidden labeling of the output results. Guest users can proceed to the database entry page without entering userid and password.

  5. Main security risks remaining after going passwordless in the United States...

    • statista.com
    Updated Jun 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Main security risks remaining after going passwordless in the United States 2023 [Dataset]. https://www.statista.com/statistics/1446289/passwordless-authentication-top-security-risks-us/
    Explore at:
    Dataset updated
    Jun 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    United States
    Description

    In 2023, ** percent of respondents among IT and cybersecurity leaders in the United States mentioned security misconfigurations as one of the main security risks their company would still face after going passwordless. In addition, ** percent of respondents noted that service accounts connecting databases, applications, platforms, and running processes within their organization would still be vulnerable. Overall, various threats such as phishing attacks, social engineering, biometrics thefts, or man-in-the middle attacks would still be possible even after a company has ceased to use passwords.

  6. d

    Public Debt Database

    • catalog.data.gov
    • data.wa.gov
    • +3more
    Updated Mar 29, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    data.wa.gov (2024). Public Debt Database [Dataset]. https://catalog.data.gov/dataset/public-debt-database
    Explore at:
    Dataset updated
    Mar 29, 2024
    Dataset provided by
    data.wa.gov
    Description

    Covers data on bonds issued in Washington State since 2000 Search by issuer name, user name, or date range Many official statements and bond covenants for bonds issued since 2008 can be viewed and downloaded No password required

  7. Individuals who have used the Internet in the last 12 months and have a...

    • data.europa.eu
    html, unknown
    Updated Jun 11, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    VLADA REPUBLIKE SLOVENIJE STATISTIČNI URAD REPUBLIKE SLOVENIJE (2024). Individuals who have used the Internet in the last 12 months and have a digital certificate or a one-time smsPASS password generator and reasons why they do not have one, by age groups and sex, Slovenia, 2019 [Dataset]. https://data.europa.eu/data/datasets/surs2982325s?locale=en
    Explore at:
    html, unknownAvailable download formats
    Dataset updated
    Jun 11, 2024
    Dataset provided by
    Government of Slovenia
    Authors
    VLADA REPUBLIKE SLOVENIJE STATISTIČNI URAD REPUBLIKE SLOVENIJE
    Area covered
    Slovenia
    Description

    This database automatically captures metadata, the source of which is the GOVERNMENT OF THE REPUBLIC OF SLOVENIA STATISTICAL USE OF THE REPUBLIC OF SLOVENIA and corresponding to the source database entitled “Individuals who have used the Internet in the last 12 months and have a digital certificate or certificate or one-time password generator smsPASS and the reasons why they do not have them, by age class and sex, Slovenia, 2019”.

    Actual data are available in Px-Axis format (.px). With additional links, you can access the source portal page for viewing and selecting data, as well as the PX-Win program, which can be downloaded free of charge. Both allow you to select data for display, change the format of the printout, and store it in different formats, as well as view and print tables of unlimited size, as well as some basic statistical analyses and graphics.

  8. d

    LPDB: Ligand-Protein DataBase

    • dknet.org
    • scicrunch.org
    Updated Jan 29, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2022). LPDB: Ligand-Protein DataBase [Dataset]. http://identifiers.org/RRID:SCR_008172
    Explore at:
    Dataset updated
    Jan 29, 2022
    Description

    The Ligand Protein Database is designed to allow the selection of complexes based on various properties of receptors and ligands for the design and parametrization of new scoring functions or to assess and improve existing ones. Moreover, for each complex, a continuum of ligand positions ranging from the crystallographic position to points on the surface of the protein receptor allows an assessment of the energetic behavior of particular scoring functions. Access to the database is password protected. To obtain access to the LPDB, complete a form, available online, have it signed by your research advisor, and fax the completed form back to the attention of Professor Charles L. Brooks III, (858) 784-8688. There is no fee for academic use of the LPDB. We are currently working out details for licensing to our colleagues in industry. Please contact Professor Brooks to obtain current information on access to the LPDB.

  9. w

    Global Password Recovery Software Market Research Report: By Application...

    • wiseguyreports.com
    Updated Jan 3, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    wWiseguy Research Consultants Pvt Ltd (2025). Global Password Recovery Software Market Research Report: By Application (Windows Password Recovery, Mac Password Recovery, Email Password Recovery, Database Password Recovery), By Deployment Type (On-Premises, Cloud-Based), By End User (Individual Users, Small Enterprises, Large Enterprises), By Platform (Windows, Mac, Linux) and By Regional (North America, Europe, South America, Asia Pacific, Middle East and Africa) - Forecast to 2032. [Dataset]. https://www.wiseguyreports.com/de/reports/password-recovery-software-market
    Explore at:
    Dataset updated
    Jan 3, 2025
    Dataset authored and provided by
    wWiseguy Research Consultants Pvt Ltd
    License

    https://www.wiseguyreports.com/pages/privacy-policyhttps://www.wiseguyreports.com/pages/privacy-policy

    Area covered
    Global
    Description
    BASE YEAR2024
    HISTORICAL DATA2019 - 2024
    REPORT COVERAGERevenue Forecast, Competitive Landscape, Growth Factors, and Trends
    MARKET SIZE 20232.39(USD Billion)
    MARKET SIZE 20242.56(USD Billion)
    MARKET SIZE 20324.5(USD Billion)
    SEGMENTS COVEREDApplication, Deployment Type, End User, Platform, Regional
    COUNTRIES COVEREDNorth America, Europe, APAC, South America, MEA
    KEY MARKET DYNAMICSIncreasing cyber threats, Growing data recovery needs, Rising demand for user authentication, Advancements in recovery technologies, Expanding cloud storage usage
    MARKET FORECAST UNITSUSD Billion
    KEY COMPANIES PROFILEDiSunshare, Stellar Data Recovery, Recoverit, Microsoft, Nucleus Data Recovery, Tenorshare, TweakBit, ElcomSoft, Asoftech, Remo Software, DiskInternals, SysTools, Data Doctor, PassFab, MiniTool
    MARKET FORECAST PERIOD2025 - 2032
    KEY MARKET OPPORTUNITIESRising cyber security concerns, Increasing remote work adoption, Growth in e-commerce transactions, Demand for data privacy solutions, Advancements in AI technology.
    COMPOUND ANNUAL GROWTH RATE (CAGR) 7.3% (2025 - 2032)
  10. Data from: Long Live The Image: Container-Native Data Persistence in...

    • zenodo.org
    bin, pdf
    Updated Jul 17, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zheng Li; Zheng Li (2024). Long Live The Image: Container-Native Data Persistence in Production [Dataset]. http://doi.org/10.5281/zenodo.6388123
    Explore at:
    bin, pdfAvailable download formats
    Dataset updated
    Jul 17, 2024
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Zheng Li; Zheng Li
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The (Docker) source files for creating a read-only database container.

    Note:

    "tail -F /var/log/mysql/error.log" (after the demo of selecting all data) makes the container keep alive as a MySQL server.

    To be Updated:

    The database user and password are still hardcoded.

  11. v

    Export Import Database Updates

    • volza.com
    Updated Jun 12, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Volza FZ LLC (2025). Export Import Database Updates [Dataset]. https://www.volza.com/
    Explore at:
    Dataset updated
    Jun 12, 2025
    Dataset authored and provided by
    Volza FZ LLC
    Description

    This dataset contains updates on export and import activities, including detailed records of transactions, commodities, volumes, and values across various countries provided by Volza FZ LLC.

  12. Supporting Online Material for ICSE2021

    • figshare.com
    zip
    Updated Feb 2, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Christoph Mayr-Dorn (2022). Supporting Online Material for ICSE2021 [Dataset]. http://doi.org/10.6084/m9.figshare.12840053.v1
    Explore at:
    zipAvailable download formats
    Dataset updated
    Feb 2, 2022
    Dataset provided by
    Figsharehttp://figshare.com/
    Authors
    Christoph Mayr-Dorn
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This is supporting online material for the submission ``Supporting Quality Assurance with Automated Process-Centric Quality Constraints Checking''Contains:- Neo4J database containing the Jira issues and changes from the Dronology data set (all names of involved users have been anonymized in the issues and change events)- Process definitions and constraints for Dronology (a set of Drools .drl files in ProcessConstraints.zip) - java package names have been obfuscated to adhere to doubleblind requirements. DRL files are informative only, as due to double-blind requirements, we cannot provide the source code at this stage. We will make it available publicly via Github upon paper publication.- jupyter notebook analysing the output from evaluation runs (Evaluation.ipynb)- Raw data from the evaluation runs ( .csv files zipped in PerProcessedAndPerConstraintsCSVfiles.zip)Due to confidentiality agreements, we cannot provide any data from the industrial case study.To install the Neo4J database:1) Prepare an empty Neo4J database (version 3.5.15) e.g., useing Neo4J Desktop2) Extract the databases.zip file3) Copy the graph.db folder and store_lock file into the databases folder of your neo4j database4) Start the neo4j database, the password is: dronology

  13. Awesome Public Datasets as Neo4j Graph

    • kaggle.com
    Updated Dec 20, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Manav Sehgal (2016). Awesome Public Datasets as Neo4j Graph [Dataset]. https://www.kaggle.com/datasets/startupsci/awesome-datasets-graph/suggestions?status=pending
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Dec 20, 2016
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Manav Sehgal
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    Context

    The awesome datasets graph is a Neo4j graph database which catalogs and classifies datasets and data sources as scraped from the Awesome Public Datasets GitHub list.

    Content

    We started with a simple list of links on the Awesome Public Datasets page. We now have a semantic graph database with 10 labels, five relationship types, nine property keys, and more than 400 nodes. All within 1MB of database footprint. All database operations are query driven using the powerful and flexible Cypher Graph Query Language.

    The download includes CSV files which were created as an interim step after scraping and wrangling the source. The download also includes a working Neo4j Graph Database. Login: neo4j | Password: demo.

    Acknowledgements

    Data scraped from Awesome Public Datasets page. Prepared for the book Data Science Solutions.

    Inspiration

    While we have done basic data wrangling and preparation, how can this graph prove useful for your data science workflow? Can we record our data science project decisions taken across workflow stages and how the data catalog (datasources, datasets, tools) use cases help in these decisions by achieving data science solutions strategies?

  14. n

    Morpholino Database

    • neuinfo.org
    • dknet.org
    • +2more
    Updated Sep 26, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Morpholino Database [Dataset]. http://identifiers.org/RRID:SCR_001378
    Explore at:
    Dataset updated
    Sep 26, 2024
    Description

    Central database to house data on morpholino screens currently containing over 700 morpholinos including control and multiple morpholinos against the same target. A publicly accessible sequence-based search opens this database for morpholinos against a particular target for the zebrafish community. Morpholino Screens: They set out to identify all cotranslationally translocated genes in the zebrafish genome (Secretome/CTT-ome). Morpholinos were designed against putative secreted/CTT targets and injected into 1-4 cell stage zebrafish embryos. The embryos were observed over a 5 day period for defects in several different systems. The first screen examined 184 gene targets of which 26 demonstrated defects of interest (Pickart et al. 2006). A collaboration with the Verfaillie laboratory examined the knockdown of targets identified in a comparative microarray analysis of hematopoietic stem cells demonstrating how microarray and morpholino technologies can be used in conjunction to enrich for defects in specific developmental processes. Currently, many collaborations are underway to identify genes involved in morphological, kidney, skin, eye, pigment, vascular and hematopoietic development, lipid metabolism and more. The screen types referred to in the search functions are the specific areas of development that were examined during the various screens, which include behavior, general morphology, pigmentation, toxicity, Pax2 expression, and development of the craniofacial structures, eyes, kidneys, pituitary, and skin. Only data pertaining to specific tests performed are presented. Due to the complexity of this international collaboration and time constraints, not all morpholinos were subjected to all screen types. They are currently expanding public access to the database. In the future we will provide: * Mortality curves and dose range for each morpholino * Preliminary data regarding the effectiveness of each morpholino * Expanded annotation for each morpholino * External linkage of our morpholino sequences to ZFIN and Ensembl. To submit morpholino-knockdown results to MODB please contact the administrator for a user name and password.

  15. Z

    SSHOC - National Gallery - Grounds Database CIDOC CRM Mapped Dataset

    • data.niaid.nih.gov
    • dataverse.nl
    • +1more
    Updated Jul 16, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Joseph Padfield (2024). SSHOC - National Gallery - Grounds Database CIDOC CRM Mapped Dataset [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_6478779
    Explore at:
    Dataset updated
    Jul 16, 2024
    Dataset provided by
    Orla Delaney
    Joseph Padfield
    License

    Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)https://creativecommons.org/licenses/by-nc-sa/4.0/
    License information was derived automatically

    Description

    In 2018 the IPERION-CH Grounds Database was presented to examine how the data produced through the scientific examination of historic painting preparation or grounds samples, from multiple institutions could be combined in a flexible digital form. Exploring the presentation of interrelated high resolution images, text, complex metadata and procedural documentation. The original main user interface is live, though password protected at this time. Work within the SSHOC project aimed to reformat the data to create a more FAIR data-set, so in addition to mapping it to a standard ontology, to increase Interoperability, it has also been made available in the form of open linkable data combined with a SPARQL end-point. A draft version of this live data presentation can been found Here.

    This is a draft data-set and further work is planned to debug and improve its semantic structure.This deposit contains the CIDOC-CRM mapped data formatted in XML and an example model diagram representing some of the key relationships covered in the data-set.

  16. d

    NIST SAHA Plasma Population Kinetics Modeling Database - SRD 158

    • datadiscoverystudio.org
    • data.nist.gov
    Updated Jan 1, 2006
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2006). NIST SAHA Plasma Population Kinetics Modeling Database - SRD 158 [Dataset]. http://datadiscoverystudio.org/geoportal/rest/metadata/item/a0bc944275a14380ab5914f721ba7f23/html
    Explore at:
    Dataset updated
    Jan 1, 2006
    Description

    This database contains benchmark results for simulation of plasma population kinetics and emission spectra. The data were contributed by the participants of the 3rd Non-LTE Code Comparison Workshop who have unrestricted access to the database. The only limitation for other users is in hidden labeling of the output results. Guest users can proceed to the database entry page without entering userid and password.

  17. Data from: SQL Injection Attack Netflow

    • zenodo.org
    • portalcientifico.unileon.es
    • +1more
    Updated Sep 28, 2022
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas (2022). SQL Injection Attack Netflow [Dataset]. http://doi.org/10.5281/zenodo.6907252
    Explore at:
    Dataset updated
    Sep 28, 2022
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Ignacio Crespo; Ignacio Crespo; Adrián Campazas; Adrián Campazas
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Introduction

    This datasets have SQL injection attacks (SLQIA) as malicious Netflow data. The attacks carried out are SQL injection for Union Query and Blind SQL injection. To perform the attacks, the SQLMAP tool has been used.

    NetFlow traffic has generated using DOROTHEA (DOcker-based fRamework fOr gaTHering nEtflow trAffic). NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated. A flow is defined as a unidirectional sequence of packets with some common properties that pass through a network device.

    Datasets

    The firts dataset was colleted to train the detection models (D1) and other collected using different attacks than those used in training to test the models and ensure their generalization (D2).

    The datasets contain both benign and malicious traffic. All collected datasets are balanced.

    The version of NetFlow used to build the datasets is 5.

    DatasetAimSamplesBenign-malicious
    traffic ratio
    D1Training400,00350%
    D2Test57,23950%

    Infrastructure and implementation

    Two sets of flow data were collected with DOROTHEA. DOROTHEA is a Docker-based framework for NetFlow data collection. It allows you to build interconnected virtual networks to generate and collect flow data using the NetFlow protocol. In DOROTHEA, network traffic packets are sent to a NetFlow generator that has a sensor ipt_netflow installed. The sensor consists of a module for the Linux kernel using Iptables, which processes the packets and converts them to NetFlow flows.

    DOROTHEA is configured to use Netflow V5 and export the flow after it is inactive for 15 seconds or after the flow is active for 1800 seconds (30 minutes)

    Benign traffic generation nodes simulate network traffic generated by real users, performing tasks such as searching in web browsers, sending emails, or establishing Secure Shell (SSH) connections. Such tasks run as Python scripts. Users may customize them or even incorporate their own. The network traffic is managed by a gateway that performs two main tasks. On the one hand, it routes packets to the Internet. On the other hand, it sends it to a NetFlow data generation node (this process is carried out similarly to packets received from the Internet).

    The malicious traffic collected (SQLI attacks) was performed using SQLMAP. SQLMAP is a penetration tool used to automate the process of detecting and exploiting SQL injection vulnerabilities.

    The attacks were executed on 16 nodes and launch SQLMAP with the parameters of the following table.

    ParametersDescription
    '--banner','--current-user','--current-db','--hostname','--is-dba','--users','--passwords','--privileges','--roles','--dbs','--tables','--columns','--schema','--count','--dump','--comments', --schema'Enumerate users, password hashes, privileges, roles, databases, tables and columns
    --level=5Increase the probability of a false positive identification
    --risk=3Increase the probability of extracting data
    --random-agentSelect the User-Agent randomly
    --batchNever ask for user input, use the default behavior
    --answers="follow=Y"Predefined answers to yes

    Every node executed SQLIA on 200 victim nodes. The victim nodes had deployed a web form vulnerable to Union-type injection attacks, which was connected to the MYSQL or SQLServer database engines (50% of the victim nodes deployed MySQL and the other 50% deployed SQLServer).

    The web service was accessible from ports 443 and 80, which are the ports typically used to deploy web services. The IP address space was 182.168.1.1/24 for the benign and malicious traffic-generating nodes. For victim nodes, the address space was 126.52.30.0/24.
    The malicious traffic in the test sets was collected under different conditions. For D1, SQLIA was performed using Union attacks on the MySQL and SQLServer databases.

    However, for D2, BlindSQL SQLIAs were performed against the web form connected to a PostgreSQL database. The IP address spaces of the networks were also different from those of D1. In D2, the IP address space was 152.148.48.1/24 for benign and malicious traffic generating nodes and 140.30.20.1/24 for victim nodes.

    To run the MySQL server we ran MariaDB version 10.4.12.
    Microsoft SQL Server 2017 Express and PostgreSQL version 13 were used.

  18. Authentication technologies deployed and used by companies worldwide 2022

    • statista.com
    Updated Jul 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Authentication technologies deployed and used by companies worldwide 2022 [Dataset]. https://www.statista.com/statistics/1359447/global-authentication-technologies-used-worldwide/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2022
    Area covered
    Worldwide
    Description

    In 2022, the most used authentication technology by companies worldwide was multi-factor authentication (MFA), followed by cloud-based single sign-on. Moreover, ** percent of respondents stated that their company used a passwordless authentication system.

    An additional layer of security over the passwords

    MFA uses extra verification information over a generic password, resulting in an additional layer of authentication for security, with a market size close to ** billion U.S. dollars worldwide in 2022. Most MFA authentication methods rely on one of three types of information: something you know - like a password or PIN; something you have - like a security token or smartphone; or something you are - like a biometric such as fingerprints or facial recognition.

    Barriers to the adoption of MFA

    Implementing MFA can be challenging due to user resistance with concerns of mass surveillance using linked databases. Some of the other concerns include poor user experience and difficulties in integration into legacy systems. To overcome these adoption barriers, educating users about the benefits and risks of MFA with regard to biometrics and making the authentication process as seamless and user-friendly as possible is essential. 

  19. Regional DataBase, RDB, commercial fisheries data

    • gis.ices.dk
    • data.europa.eu
    Updated Sep 30, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    International Council for the Exploration of the Sea (ICES) RDB Team (2016). Regional DataBase, RDB, commercial fisheries data [Dataset]. https://gis.ices.dk/geonetwork/srv/api/records/bc2916f2-6afd-43d5-b905-ce8c3146118d
    Explore at:
    www:link-1.0-http--linkAvailable download formats
    Dataset updated
    Sep 30, 2016
    Dataset provided by
    International Council for the Exploration of the Sea
    License

    http://inspire.ec.europa.eu/metadata-codelist/LimitationsOnPublicAccess/INSPIRE_Directive_Article13_1hhttp://inspire.ec.europa.eu/metadata-codelist/LimitationsOnPublicAccess/INSPIRE_Directive_Article13_1h

    Area covered
    Description

    The Regional DataBase, RDB, is a database and estimation system where countries upload catch and sample data for commercial fish species requested in Regional Coordination Groups' Data Call for coordination of sampling of commercial fish species. To upload data, work on data, raise/estimate data and to download data, a password is required.

  20. e

    Trademark database export

    • data.europa.eu
    Updated Nov 19, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Patent- och registreringsverket (2022). Trademark database export [Dataset]. https://data.europa.eu/88u/dataset/https-data-prv-se-dataset-jsp-uuid-e1fc1ed4d5174b9083b8e2013e53ba77817177c262d34c2a98234ed23a0611a2
    Explore at:
    Dataset updated
    Nov 19, 2022
    Dataset authored and provided by
    Patent- och registreringsverket
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description

    PRV publishes the contents of the Swedish Trademark Database via a collection of files that can be downloaded from our ftp server. The data files and associated image files (compressed in zip archives) are made available in XML format and are updated daily. They are available via a full withdrawal as well as via daily incremental updates.

    The database is available from our ftp-server with the following connection information: URL: ftp://opendata.prv.se Username: OpenDataSource Password: opendata

    Further documentation about usage and formats is available on the ftp-server in the folder "TrademarkExport/NewExport/Documentation".

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
Organization logo

"Pwned Passwords" Dataset

Explore at:
bittorrent(11101449979)Available download formats
Dataset updated
Aug 3, 2018
Dataset provided by
Have I Been Pwned?http://haveibeenpwned.com/
License

https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

Description

Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

Search
Clear search
Close search
Google apps
Main menu