funsec mailing list archives

LOBSTER's Catch Offers Security Research Opportunity


From: "Paul Ferguson" <fergdawg () netzero net>
Date: Fri, 13 Jul 2007 20:13:59 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Via TERENA News.

[snip]

A selection of files is now available to researchers interested in
evaluating cyber-attack detection methods, or in studying data from real
life attacks.

The attack trace files can be downloaded from a website created as a
spin-off of the LOBSTER pilot project, which has been monitoring Internet
traffic across Europe since October 2004.

LOBSTER has captured more than 40,000 Internet attacks using 36 passive
monitoring sensors deployed in nine different countries. It was a step
towards an advanced European infrastructure that will improve our
understanding of the Internet and help solve performance and security
problems.

The full details of these thousands of attacks cannot be made public
because of privacy issues. A very small sample has been carefully
anonymised, using software developed by the LOBSTER team, in order to
remove sensitive information that could identify either the source or the
destination of each attack. This sample is accessible through the LOBSTER
attack trace repository.

[snip]

More:
http://www.terena.org/news/fullstory.php?news_id=2138

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.2 (Build 2014)

wj8DBQFGl90Dq1pz9mNUZTMRArFBAJ0V1ZdOwyva7h+mBGdEHuxmu4bMxgCbBYzz
TZCm5drO/eql1JLmN9HOBkk=
=rB4d
-----END PGP SIGNATURE-----


--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/


_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: