There is a newer version of this record available.

Dataset Open Access

AIT Log Data Set V1.0

Landauer Max; Skopik Florian; Wurzenberger Markus; Hotwagner Wolfgang; Rauber Andreas

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.3723083</identifier>
      <creatorName>Landauer Max</creatorName>
      <affiliation>AIT Austrian Institute of Technology</affiliation>
      <creatorName>Skopik Florian</creatorName>
      <affiliation>AIT Austrian Institute of Technology</affiliation>
      <creatorName>Wurzenberger Markus</creatorName>
      <affiliation>AIT Austrian Institute of Technology</affiliation>
      <creatorName>Hotwagner Wolfgang</creatorName>
      <affiliation>AIT Austrian Institute of Technology</affiliation>
      <creatorName>Rauber Andreas</creatorName>
      <affiliation>Vienna University of Technology</affiliation>
    <title>AIT Log Data Set V1.0</title>
    <date dateType="Issued">2020-03-21</date>
  <resourceType resourceTypeGeneral="Dataset"/>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.3723082</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution Non Commercial Share Alike 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;&lt;strong&gt;AIT Log Data Sets&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This repository contains synthetic log data suitable for evaluation of intrusion detection systems. The logs were collected from four independent testbeds that were built at the Austrian Institute of Technology (AIT) following the approach by Landauer et al. (2020) [1]. Please refer to the paper for more detailed information on automatic testbed generation and cite it if the data is used for academic publications. In brief, each testbed simulates user accesses to a webserver that runs Horde Webmail and OkayCMS. The duration of the simulation is six days. On the fifth day (2020-03-04) two attacks are launched against each web server.&lt;/p&gt;

&lt;p&gt;The archive contains the directories &amp;quot;data&amp;quot; and &amp;quot;labels&amp;quot;.&lt;/p&gt;

&lt;p&gt;The data directory is structured as follows. Each directory mail.&amp;lt;name&amp;gt;.com contains the logs of one web server. Each directory user-&amp;lt;ID&amp;gt; contains the logs of one user host machine, where one or more users are simulated. Each file log&amp;lt;UID&amp;gt;.log in the user-&amp;lt;ID&amp;gt; directories contains the activity logs of one particular user.&lt;/p&gt;

&lt;p&gt;Setup details of the web servers:&lt;/p&gt;

	&lt;li&gt;OS: Debian Stretch 9.11.6&lt;/li&gt;
		&lt;li&gt;Exim 4.89&lt;/li&gt;
		&lt;li&gt;Horde 5.2.22&lt;/li&gt;
		&lt;li&gt;OkayCMS 2.3.4&lt;/li&gt;

&lt;p&gt;Setup details of user machines:&lt;/p&gt;

	&lt;li&gt;OS: Ubuntu Bionic&lt;/li&gt;

&lt;p&gt;User host machines are assigned to web servers in the following way:&lt;/p&gt;

	&lt;li&gt; is accessed by users from host machines user-{0, 1, 2, 6}&lt;/li&gt;
	&lt;li&gt; is accessed by users from host machines user-{3, 5, 8}&lt;/li&gt;
	&lt;li&gt; is accessed by users from host machines user-{4, 9}&lt;/li&gt;
	&lt;li&gt; is accessed by users from host machines user-{7, 10}&lt;/li&gt;

&lt;p&gt;The following attacks are launched against the web servers (different starting times for each web server, please check the labels for exact attack times):&lt;/p&gt;

	&lt;li&gt;Attack 1: multi-step attack with sequential execution of the following attacks:
		&lt;li&gt;nmap scan&lt;/li&gt;
		&lt;li&gt;nikto scan&lt;/li&gt;
		&lt;li&gt;smtp-user-enum tool for account enumeration&lt;/li&gt;
		&lt;li&gt;hydra brute force login&lt;/li&gt;
		&lt;li&gt;webshell upload through Horde exploit (CVE-2019-9858)&lt;/li&gt;
		&lt;li&gt;privilege escalation through Exim exploit (CVE-2019-10149)&lt;/li&gt;
	&lt;li&gt;Attack 2: webshell injection through malicious cookie (CVE-2019-16885)&lt;/li&gt;

&lt;p&gt;Attacks are launched from the following user host machines. In each of the corresponding directories user-&amp;lt;ID&amp;gt;, logs of the attack execution are found in the file attackLog.txt:&lt;/p&gt;

	&lt;li&gt;user-6 attacks;/li&gt;
	&lt;li&gt;user-5 attacks;/li&gt;
	&lt;li&gt;user-4 attacks;/li&gt;
	&lt;li&gt;user-7 attacks;/li&gt;

&lt;p&gt;The log data collected from the web servers includes&lt;/p&gt;

	&lt;li&gt;&amp;nbsp;Apache access and error logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;syscall logs collected with the Linux audit daemon&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;suricata logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;exim logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;auth logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;daemon logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;mail logs&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;user logs&lt;/li&gt;

Note that due to their large size, the audit/audit.log files of each server were compressed in a .zip-archive. In case that these logs are needed for analysis, they must first be unzipped.&lt;br&gt;
Labels are organized in the same directory structure as logs. Each file contains two labels for each log line separated by a comma, the first one based on the occurrence time, the second one based on similarity and ordering. Note that this does not guarantee correct labeling for all lines and that no manual corrections were conducted.&lt;/p&gt;

&lt;p&gt;[1] Landauer M., Skopik F., Wurzenberger M., Hotwagner W., Rauber A., &amp;quot;Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed&amp;quot;. IEEE Transactions on Reliability. 2020.&lt;/p&gt;</description>
    <description descriptionType="Other">Additionally funded by the FFG projects INDICAETING (868306) and DECEPT (873980).</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/833456/">833456</awardNumber>
      <awardTitle>A cybersecurity framework to GUArantee Reliability and trust for Digital service chains</awardTitle>
All versions This version
Views 1,288744
Downloads 496338
Data volume 1.6 TB1.1 TB
Unique views 1,046655
Unique downloads 312189


Cite as