U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Trojan Detection Software Challenge - cyber-network-c2-mar2024-train

TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

About this Dataset

Updated: 2024-09-06
Metadata Last Updated: 2024-03-11 00:00:00
Date Created: N/A
Data Provided by:
Dataset Owner: N/A

Access this data

Contact dataset owner Access URL
Landing Page URL
Table representation of structured data
Title Trojan Detection Software Challenge - cyber-network-c2-mar2024-train
Description TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Modified 2024-03-11 00:00:00
Publisher Name National Institute of Standards and Technology
Contact mailto:[email protected]
Keywords Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
{
    "identifier": "ark:\/88434\/mds2-3209",
    "accessLevel": "public",
    "contactPoint": {
        "hasEmail": "mailto:[email protected]",
        "fn": "Michael Paul Majurski"
    },
    "programCode": [
        "006:045"
    ],
    "landingPage": "https:\/\/data.nist.gov\/od\/id\/mds2-3209",
    "title": "Trojan Detection Software Challenge - cyber-network-c2-mar2024-train",
    "description": "TrojAI cyber-network-c2-mar2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.",
    "language": [
        "en"
    ],
    "distribution": [
        {
            "accessURL": "https:\/\/drive.google.com\/drive\/folders\/1S8LQ2J8pkeq4vX_Fya1aUfqdg7G9GFJL?usp=sharing",
            "title": "cyber-network-c2-mar2024-train"
        }
    ],
    "bureauCode": [
        "006:55"
    ],
    "modified": "2024-03-11 00:00:00",
    "publisher": {
        "@type": "org:Organization",
        "name": "National Institute of Standards and Technology"
    },
    "theme": [
        "Information Technology:Software research",
        "Information Technology:Cybersecurity"
    ],
    "keyword": [
        "Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;"
    ]
}