Search this site
Embedded Files
Dr. Abhishek Verma
  • Home
  • Professional Experience
  • Publications
  • R&D Projects
  • Education
  • Teaching
  • Administrative Responsibilities
  • Academic Responsibilities
  • Awards, Honors and Professional Recognition
  • Expert Talk / Visit
  • Professional Memberships
  • Events Organized
  • Students
  • Resources
  • Contact Me
Dr. Abhishek Verma
  • Preprints of research articles and conference papers [TechRxiv]

  • Ph.D Thesis [Design and Development of Intrusion Detection Systems for Internet of Things]

  • M.Tech Dissertation [An Obstacle-resistant Relay Node Placement in Constrained Environment]

  • Contiki OS [Link]

  • Contiki-NG [Link]

  • MiKTex 2.9 + packages for Windows [Link]

  • Power and Energy consumption calculation using Powertrace [Link]

  • GATE (CS) Question Papers and Answer Keys  [2015-2021]

  • BEAMER appearance cheat sheet [Link]

  • Book for learning Contiki and Cooja simulator [Link]

  • Setting up SDN network using OpenVSwitch (2.17.2) on Raspberry Pi [Link]

DATASETS

Datasets for Research Scholars

MALWARE DATASETS AND ANALYSIS

  1. Microsoft Malware Classification Challenge (BIG 2015) (https://www.kaggle.com/c/malware-classification/data)

  2. Ember: An Open Source Malware Classifier And Dataset (https://www.endgame.com/)

  3. VX Heavens ( http://vx.netlux.org/)

  4. Malware Dump ( http://www.malwaredump.com/)

  5. VirusShare (https://virusshare.com/)

  6. CLEAN MX realtime database ( http://support.clean-mx.de/clean-mx/login.php)

  7. Multiple AV scanning (http://www.virustotal.com)

  8. Cuckoo Sandbox (http://www.cuckoobox.org)

  9. Anubis Malware Analysis (http://anubis.iseclab.org)

  10. BitBlaze Malware Analysisi (https://aerie.cs.berkeley.edu/index.php)

  11. ThreatExpert Malware Analysis (http://www.threatexpert.com)

  12. SRI Honeynet/BotHunter Analysis Info (http://www.cyber-ta.org/releases/malware-analysis/public/)

  13. Ether: Malware Analysis via Hardware Virtualization Extensions (http://ether.gtisc.gatech.edu/source.html)

  14. Honeynet Project Malware Collection and Analysis tools (http://www.honeynet.org/project)

  15. MWcollect (http://www.mwcollect.org)

  16. OffensiveComputing Malware Dataset (http://www.offensivecomputing.net)

  17. Malfease Project Malware Dataset (http://malfease.oarci.net)

  18. Malware Hash Registry (http://www.team-cymru.org/Services/MHR/)

  19. SRI Malware Threat Center (http://mtc.sri.com)

  20. Clean-MX Malware URLs (http://support.clean-mx.de/clean-mx/viruses.php)

  21. Binary Whitelisting by Shadowserver/NIST (http://bin-test.shadowserver.org)

IOT MALWARE DATASETS

  1. Android Malware Dataset (http://amd.arguslab.org/)

NETWORK TRAFFIC DATASETS

  1. LBNL/ICSI Enterprise Network Traffic Dataset (Header File) (http://www.icir.org/enterprise-tracing/Overview.html)

  2. Endpoint Worm Scan Dataset (Full Payload) (http://nexginrc.org/Datasets/DatasetDetail.aspx?pageID=24)

  3. The CAIDA "DDoS Attack 2007" Dataset (http://www.caida.org/data/passive/ddos-20070804_dataset.xml)

  4. The NSL-KDD Data Set ( http://nsl.cs.unb.ca/NSL-KDD/)

  5. DARPA Intrusion Detection Datasets (Full Payload) ( http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html)

  6. Network Warfare Labeled Datasets ( http://www.itoc.usma.edu/research/dataset/index.html)

  7. Publicly Available PCAPs (http://sourceforge.net/apps/mediawiki/networkminer/index.php?title=Publicly_available_PCAP_files)

  8. LBNL/ICSI Enterprise Network Traffic Dataset (http://www.icir.org/enterprise-tracing/Overview.html)

  9. 2009-M57-Patents Enterprise Network Traffic Dataset (http://digitalcorpora.org/corpora/scenarios/m57-patents-scenario)

  10. WisNet Traffic Datasets (http://www.wisnet.seecs.nust.edu.pk/projects/ENS/DataSets.html)

  11. Internet Traffic Archive (http://www.sigcomm.org/ITA/)

  12. RIPE Routing Information Service BGP Dataset (http://www.ripe.net/projects/ris/rawdata.html)

  13. Route View Project (http://www.routeviews.or), (http://archive.routeviews.org)

NETWORKING AND NETWORK SECURITY

  1. IP to ASN Mapping (http://www.team-cymru.org/Services/ip-to-asn.html)

  2. ISC Security Information Exchange (https://sie.isc.org)

  3. DNS tools (https://www.dns-oarc.net/oarc/tools)

  4. Passive DNS Replication (http://www.bfk.de/bfk_dnslogger_en.html)

  5. DNS-WhiteList Project (http://www.dnswl.org/tech)

  6. Bots/Botnet Traking Statistics,.. (http://www.shadowserver.org)

  7. Zeus Botnet Tracker (https://zeustracker.abuse.ch)

  8. Waledac Botnet Tracker (http://www.sudosecure.net/waledac/)

  9. Fast Flux Traking (http://dnsbl.abuse.ch/fastfluxtracker.php)

  10. SpamTrackers Wiki (http://www.spamtrackers.eu/wiki/index.php/Main_Page)

  11. URIBL Domain Black List (http://www.uribl.com)

  12. Malware-related Domain Black List (http://www.malwaredomains.com)

  13. Malware Distribution URLs Blacklist (http://malwarepatrol.com/lists.shtml)

  14. IP Black Lists (http://www.spamhaus.org/zen/)

  15. SORBS DNSBL (http://www.us.sorbs.net)

  16. Spamhaus Don't Route Or Peer List (http://www.spamhaus.org/drop/index.lasso)

  17. Large-Scale Network Statistics (http://www.dshield.org)

  18. Free TCP/IP Guide (http://www.tcpipguide.com/free/index.htm)

  19. Free IP Geolocation (http://www.hostip.info/dl/index.html)

  20. ARIN Whois Database (https://www.arin.net/resources/whoisrws/whois_api.html)

  21. dpkt, packet manipulation for Python (http://code.google.com/p/dpkt/)

  22. Scapy, packet manipulation library for Python (http://www.secdev.org/projects/scapy/)

  23. NIST Net, emulates performance dynamics in IP networks (http://snad.ncsl.nist.gov/nistnet/)

  24. Top 100 Network Security Tools (http://sectools.org/)

  25. Browser Security Handbook (http://code.google.com/p/browsersec/wiki/Main)

TRAFFIC CLASSIFICATION

  1. Computer Laboratory of the University of Cambridge, Nprobe/GRIDprobe Data (including P2P traffic) (http://www.cl.cam.ac.uk/research/srg/netos/nprobe/data/index.html)

  2. WAND Network Research Group of the University of Waikato, WITS: Auckland IV Data Traces (header traces including P2P traffic) (http://wand.cs.waikato.ac.nz/wits/auck/4/)

  3. Stanford University, Stanford Large Network Dataset Collection ( http://snap.stanford.edu/data/)

PENETRATION TESTING / EXPLOITS / FORENSICS

  1. BackTrack Linux, Penetration Testing distro (http://www.backtrack-linux.org)

  2. SANS Investigate Forensic Toolkit (http://computer-forensics.sans.org/community/downloads)

  3. REMnux: A Linux Distribution for Reverse-Engineering Malware (http://zeltser.com/remnux/)

  4. Metasploit (http://www.metasploit.com)

  5. Packet Storm (http://packetstormsecurity.org)

  6. Exploit Database (http://www.exploit-db.com)

  7. Phrack Magazine (http://www.phrack.org)

MACHINE LEARNING

  1. UCI Dataset Repository (http://archive.ics.uci.edu/ml/)

  2. UCI KDD Archive (http://kdd.ics.uci.edu/)

  3. Scalable Machine Learning library based on Hadoop (http://mahout.apache.org)

  4. StatLib Data and Software (http://lib.stat.cmu.edu)

  5. Text Retrieval Datasets (http://trec.nist.gov/data.html)

  6. Weka: Data Mining Software in Java (http://www.cs.waikato.ac.nz/ml/weka/)

  7. YALE/Rapid Miner (http://sourceforge.net/projects/yale/)

  8. Pattern Recognition Tools (http://prtools.org)

  9. One-Class Classification (Data Descritpion) Tools (http://www-ict.ewi.tudelft.nl/~davidt/dd_tools.html)

  10. Kernel Machines (http://www.kernel-machines.org)

  11. LibSVM (http://www.csie.ntu.edu.tw/~cjlin/libsvm/)

  12. jLibSVM - More efficient Java implementation of LibSVM (http://dev.davidsoergel.com/trac/jlibsvm/)

  13. SVM light (http://svmlight.joachims.org)

  14. Google's Suite of Fast Incremental Algorithms for Machine Learning (SOFIA-ML) (http://code.google.com/p/sofia-ml/)

  15. The R Project for Satatistical Computing (http://www.r-project.org)

  16. KernLab: Kernel-based ML in R (http://cran.r-project.org/web/packages/kernlab/index.html)

  17. rJava: R to Java interface (http://www.rforge.net/rJava/)

  18. RWeka: R to Weka interface (http://cran.r-project.org/web/packages/RWeka/index.html)

  19. FST3: Feature Selection Toolbox (http://fst.utia.cz)

  20. FASTLib: Fundamental Algorithmic and Statistical Tools Library (http://www.cc.gatech.edu/~niche/cse6740/fastlib/FASTlib_Tutorial.html)

  21. MLPACK: Scalable Machine Learning Library (http://mloss.org/software/view/152/)

  22. MLOSS: Machine Learning Open Souce Software (http://mloss.org/software)

  23. MALLET : MAchine Learning for LanguagE Toolkit (http://mallet.cs.umass.edu)

  24. OpenCV : Open Source Computer Vision library (http://opencv.willowgarage.com/wiki/)

  25. Gneric List of ML software (http://directory.google.com/Top/Computers/Artificial_Intelligence/Machine_Learning/Software/)

  26. Distributed Data Mining Bibliography (http://www.csee.umbc.edu/~hillol/DDMBIB/ddmbib_html/DDMBIB.htm)

  27. Gephi graph visualization and analysis (http://gephi.org)

  28. SMILE, C++ Library for graphical Decision-Theoretic methods (http://genie.sis.pitt.edu)


Disclaimer - All access to this site is subjected to the condition that the site owner will be NOT held responsible for, or liable in respect of, any damages, including any general, special, incidental or consequential damages, arising out of the use or inability to use the facility. 
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse