![]() | ![]() | ![]() | ![]() | ![]() | ![]() | |
Collection Strategy | •Accessed DFIR Report data via API to relevant report. •Inserted results into a table •Table currently consist of 413 file sample with information | •Intrusion Detection Evaluation Dataset (CIC-IDS2017) •Large 7GB file •Accessed Kaggle.com GUI and downloaded CSV files(s) and query on relevant fields | •Phishing Email Intrusion Dataset •Accessed Kaggle.com GUI and downloaded CSV files(s) •Table consists of 28,747 rows | •Accessed https://www.stratosphereips.org/datasets-malware and downloaded file(s) •173MB .pcap file downloaded to csv | •JavaScript Vulnerability dataset •Accessed through GitHub data sources •Downloaded files CSV file containing 12,126 rows of data | •Malicious URLs Dataset •Accessed Kaggle.com and downloaded CSV files •Dataset consists >600, 000 rows |
Data Strategy | Query table based on filename to get more information to avoid intrusion | Query relevant fields in large data set | Query data to use for email intrusion simulation | Downloaded file is analysis ready after download | Query relevant data | Run geographic analysis on URL to identify high risk jurisdictions |