Unknown

Dataset Information

0

Hornet 40: Network dataset of geographically placed honeypots.


ABSTRACT: Deception technologies, and honeypots in particular, have been used for decades to understand how cyber attacks and attackers work. A myriad of factors impact the effectiveness of a honeypot. However, very few is known about the impact of the geographical location of honeypots on the amount and type of attacks. Hornet 40 is the first dataset designed to help understand how the geolocation of honeypots may impact the inflow of network attacks. The data consists of network flows in binary and text format, with up to 118 features, including 480 bytes of the content of each flow. They were created using the Argus flow collector. The passive honeypots are IP addresses connected to the Internet and do not have any honeypot software running, so attacks are not interactive. The data was collected from identically configured honeypot servers in eight locations: Amsterdam, Bangalore, Frankfurt, London, New York, San Francisco, Singapore, and Toronto. The dataset contains over 4.7 million network flows collected during forty days throughout April, May, and June 2021.

SUBMITTER: Valeros V 

PROVIDER: S-EPMC8749222 | biostudies-literature |

REPOSITORIES: biostudies-literature

Similar Datasets

| S-EPMC7980806 | biostudies-literature
| S-EPMC6390825 | biostudies-literature
| S-EPMC6849131 | biostudies-literature
| S-EPMC6038850 | biostudies-literature
| S-EPMC6893812 | biostudies-literature
| S-EPMC8443559 | biostudies-literature
| S-EPMC8605218 | biostudies-literature
| S-EPMC8749216 | biostudies-literature
| S-EPMC6338506 | biostudies-literature
2017-07-11 | MSV000081270 | MassIVE