DARPA'98 Intrusion Detection Program

Network Data Source tcpdumps
Network Data Labeled Ground truth provided
Host Data Source bsm audits, file system dumps
Host Data Labeled No
   
Overall Setting Military IT
OS Types Linux 2.0.27
SunOS 4.1.4
Sun Solaris 2.5.1
Windows NT
Number of Machines 1000’s
Total Runtime Nine weeks
Year of Collection 1998
Attack Categories DoS
Remote to Local
User to Root
Surveillance/Probing
Benign Activity Scripts for synthetic traffic generation, real humans for performing complex tasks
   
Packed Size 5 GB
Unpacked Size n/a
Download Link goto

Overview

One of the first major attempts to create a comprehensive dataset for intrusion detection research, tailored to aid development and evaluation of IDSs. It simulates a small Air Force base connected to the “Outside” (internet), and contains a substantial number of hosts, including automation of certain user behavior. It was originally planned to record actual operational traffic while executing attacks in a controlled manner, which in the end was not possible due to privacy and security concerns. Due to its age and a number of flaws, it should be used with reservations, if at all.

Environment

The simulated Air Force base consists of a small number of hosts, leveraging “custom software” to appear as if they were 1000s of hosts with different IP addresses.

Activity

Within the network, automated users perform an array of tasks such as sending mails, browsing, or using services like FTP, telnet or SNMP. The total duration of this simulation was nine weeks. Any protective devices such as firewalls are omitted, as “the focus was on detecting attacks, and not preventing attacks”. All attacks are performed from the outside of this network, and a sniffer is located at the entry point of the network to capture this traffic. Attacks belong to one of four categories:

  • DoS
  • Remote to Local
  • User to Root
  • Surveillance/Probing

Contained Data

Data is available in the form of tcpdumps, divided by day and week. Labels are available via a separate ground truth, listing information like IPs, ports, services and attack names. Additionally, host audit data as well as raw filesystems can be downloaded. Later publications found a number of issues with this dataset, such as the presence of simulation artifacts - for example, the TTL of malicious traffic is always 126 or 253, while benign traffic usually has the values 127 or 254.

Papers