Our Data Set
Through MauHNet, CERT-MU will be maintaining a database of structured and unstructured data captured from the honeypots deployment. The dataset shall contain information about various cyber threats, attack techniques, and malicious activities observed in the wild. This will allow CERT-MU to analyse and understand cyber threats, attack patterns and techniques. The dataset will be used for research and education purposes only.
The deployment of the honeypots will have the following benefits:
- HTTP Logs: Logs of HTTP requests and responses captured by honeypots. These logs provide insights into web-based attacks such as SQL injection, cross-site scripting (XSS), and directory traversal. This will help in understanding the tactics and techniques used by attackers to compromise web servers and applications.
- SSH Authentication Attempts: Records of failed SSH authentication attempts targeting honeypots. This dataset includes information about the usernames, passwords, and IP addresses involved in the authentication attempts. This will help in identifying common attack patterns and strengthening SSH security configurations.
- Malware Samples: Collection of malware samples captured by honeypots. These samples represent various malware families and include information about their behaviour and characteristics. Analyzing malware samples helps in identifying new malware strains, understanding their functionality, and developing effective countermeasures.
- Network Traffic Capture: Packet captures (PCAP) of network traffic captured by honeypots. this dataset includes communication patterns between malicious actors and their targets, providing insights into reconnaissance, exploitation, and exfiltration activities.
Accessing the dataset
To access to our dataset, please send us a request on contact@cert.govmu.org
Upon approval, you will receive instructions on how to download the dataset securely.