U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Trojan Detection Software Challenge - cyber-network-c2-feb2024-train

TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.

About this Dataset

Updated: 2024-09-06
Metadata Last Updated: 2023-07-22 00:00:00
Date Created: N/A
Data Provided by:
Dataset Owner: N/A

Access this data

Contact dataset owner Access URL
Table representation of structured data
Title Trojan Detection Software Challenge - cyber-network-c2-feb2024-train
Description TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.
Modified 2023-07-22 00:00:00
Publisher Name National Institute of Standards and Technology
Contact mailto:[email protected]
Keywords Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;
{
    "identifier": "ark:\/88434\/mds2-3164",
    "accessLevel": "public",
    "contactPoint": {
        "hasEmail": "mailto:[email protected]",
        "fn": "Michael Paul Majurski"
    },
    "programCode": [
        "006:045"
    ],
    "landingPage": "",
    "title": "Trojan Detection Software Challenge - cyber-network-c2-feb2024-train",
    "description": "TrojAI cyber-network-c2-feb2024 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of ResNet18 and ResNet34 neural network models that classify botnet command and control (c2) and benign network traffic packets trained on the USTC-TFC2016 dataset. A known percentage of these trained AI models have been poisoned with a known trigger which induces incorrect behavior. This data will be used to develop software solutions for detecting which trained AI models have been poisoned via embedded triggers.",
    "language": [
        "en"
    ],
    "distribution": [
        {
            "accessURL": "https:\/\/drive.google.com\/drive\/folders\/10ouRWWKOB3MJjS56wNqcPZSGnWvTUwVU?usp=sharing",
            "title": "cyber-network-c2-feb2024-train"
        }
    ],
    "bureauCode": [
        "006:55"
    ],
    "modified": "2023-07-22 00:00:00",
    "publisher": {
        "@type": "org:Organization",
        "name": "National Institute of Standards and Technology"
    },
    "theme": [
        "Information Technology:Cybersecurity",
        "Information Technology:Software research"
    ],
    "keyword": [
        "Trojan Detection; Artificial Intelligence; AI; Machine Learning; Adversarial Machine Learning;"
    ]
}