Introduction: The goal of the UNB ISCX 2012 dataset is to develop new techniques, technology, and algorithms for the automatic generation of benchmark datasets. The dataset has been created by security researchers at ISCX including Ali Shiravi, Hadi Shiravi, and Mahbod Tavallaee. The dataset is meant to aid research eﬀorts in the general areas of developing, testing and evaluating algorithms for intrusion detection and anomaly detection. The Information Security Centre of Excellence has copyright on the data and is the principal distributor of the ISCX 2012 dataset. A full description of the dataset is available here.
Release of the dataset: To advance the state-of-the-art in intrusion detection, this dataset is made available to the researcher community.
To receive a copy of the dataset, the requestor must sign this document and agree to observe the restrictions listed below.
Consent: The researcher(s) agrees to the following restrictions on the UNB ISCX 2012 dataset:
- Redistribution: Without prior written approval from the Information Security Centre of Excellence, the UNB ISCX 2012 intrusion detection evaluation dataset, in whole or in part, will not be further distributed, published, copied, or disseminated in any way or form whatsoever, whether for proﬁt or not. This includes further distributing, copying or disseminating to a diﬀerent facility or organizational unit in the requesting university, organization, or company.
- Modiﬁcation and Commercial Use: Without prior approval from the Information Security Centre of Excellence, the UNB ISCX 2012 intrusion detection evaluation dataset, in whole or in part, may not be modiﬁed or used for commercial purposes. A commercial license can be purchased here.
- Requests for the UNB ISCX 2012 dataset: All requests for the UNB ISCX 2012 dataset will be forwarded to the UNB ISCX 2012 principle investigator.
- Network Trace Privacy: In so far as possible, privacy of end users (hosts) and networks monitored and captured in the creation of these traces will be respected by the researchers. Researchers will make no attempts to reverse engineer, decrypt, or otherwise identify the original IP addresses collected in the trace. Researchers will also not attempt to extract IP addresses from encapsulated headers.
- Researchers will make no attempts to connect to, probe, or in any other way initiate contact with a machine or machine administrator identified via the traffic traces.
- Citation/Reference: All documents and papers that report on research that uses the UNB ISCX 2012 dataset will acknowledge the use of the dataset by including an appropriate citation to the following:
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, Volume 31, Issue 3, May 2012, Pages 357-374, ISSN 0167-4048, 10.1016/j.cose.2011.12.012.
- Publications to Information Security Centre of Excellence: A copy of all reports and papers that are for public or general release that use the UNB ISCX 2012 dataset should be forwarded immediately upon release or publication to the Information Security Centre of Excellence director.
- No Warranty: THE PROVIDER OF THE DATA MAKES NO REPRESENTATIONS AND EXTENDS NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED. THERE ARE NO EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE USE OF THE MATERIAL WILL NOT INFRINGE ANY PATENT, COPYRIGHT, TRADEMARK, OR OTHER PROPRIETARY RIGHTS.