Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
timyardley authored Jun 8, 2023
1 parent d4295cf commit 9d79ceb
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions pcaps/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,9 +49,9 @@ Developed as a community asset
- [HAI Dataset](https://github.com/icsdataset/hai) - The HAI dataset was collected from a realistic industrial control system (ICS) testbed augmented with a Hardware-In-the-Loop (HIL) simulator that emulates steam-turbine power generation and pumped-storage hydropower generation.
- [hvac traces](https://github.com/gkabasele/HVAC_Traces) - This repository contains pcap traces of the HVAC system of a university
- [ics attack datasets](https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets) - five datasets representing power systems, gas, and water storage ICS systems from Tommy Morris, et al.
- [iTrust Secure Water Treatment Testbed (SWaT/SUTD) Dataset](https://itrust.sutd.edu.sg/research/dataset/dataset_characteristics/#swat) - The SWaT Dataset was systematically generated from the Secure Water Treatment Testbed (SUTD) to address this need. The data collected from the testbed consists of 11 days of continuous operation. 7 days’ worth of data was collected under normal operation while 4 days’ worth of data was collected with attack scenarios. During the data collection, all network traffic, sensor and actuator data were collected [available by request]
- [iTrust WADI Dataset](https://itrust.sutd.edu.sg/research/dataset/dataset_characteristics/#wadi) - Similar to the SWaT dataset, the data collected from the Water Distribution testbed consists of 16 days of continuous operation, of which 14 days’ worth of data was collected under normal operation and 2 days with attack scenarios. During the data collection, all network traffic, sensor and actuator data were collected. [available by request]
- [iTrust EPIC Dataset](https://itrust.sutd.edu.sg/research/dataset/dataset_characteristics/#blaq) - Blaq_0 Hackathon was first organized in January 2018 for SUTD undergraduate students. Independent attack teams design and launch attacks on EPIC. Attack teams are scored according to how successful they are in performing attacks based on specific intents. [available by request]
- [iTrust Secure Water Treatment Testbed (SWaT/SUTD) Dataset](https://itrust.sutd.edu.sg/itrust-labs-home/itrust-labs_swat/) - The SWaT Dataset was systematically generated from the Secure Water Treatment Testbed (SUTD) to address this need. The data collected from the testbed consists of 11 days of continuous operation. 7 days’ worth of data was collected under normal operation while 4 days’ worth of data was collected with attack scenarios. During the data collection, all network traffic, sensor and actuator data were collected [available by request]
- [iTrust WADI Dataset](https://itrust.sutd.edu.sg/itrust-labs-home/itrust-labs_wadi/) - Similar to the SWaT dataset, the data collected from the Water Distribution testbed consists of 16 days of continuous operation, of which 14 days’ worth of data was collected under normal operation and 2 days with attack scenarios. During the data collection, all network traffic, sensor and actuator data were collected. [available by request]
- [iTrust EPIC Dataset](https://itrust.sutd.edu.sg/itrust-labs-home/itrust-labs_epic/) - Blaq_0 Hackathon was first organized in January 2018 for SUTD undergraduate students. Independent attack teams design and launch attacks on EPIC. Attack teams are scored according to how successful they are in performing attacks based on specific intents. [available by request]
- [Illinois ADSC 61850 Dataset](https://github.com/smartgridadsc/IEC61850SecurityDataset) - This repository contains network traces that describe GOOSE communications in a mock substation that consists of 4-buses and 18 IEDs. The IEDs communicate with each other using the IEC 61850 GOOSE protocol. These are traces that represent normal, disturbance, and attack scenarios.
- [mining s7 dataset](https://cloudstor.aarnet.edu.au/plus/index.php/s/9qFfeVmfX7K5IDH) - Process control cyber-attacks and labelled datasets on S7Comm critical infrastructure.
- [s4x15 dataset](https://www.netresec.com/?page=DigitalBond_S4) - captures from s4x15 conference.
Expand Down

0 comments on commit 9d79ceb

Please sign in to comment.