Published July 11, 2023 | Version 4
Dataset Open

Dataset: Shell Commands Used by Participants of Hands-on Cybersecurity Training

  • 1. Masaryk University

Description

This repository contains supplementary materials for the following journal paper:

Valdemar Švábenský, Jan Vykopal, Pavel Seda, Pavel Čeleda.
Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training.
In Elsevier Data in Brief. 2021.
https://doi.org/10.1016/j.dib.2021.107398

How to cite

If you use or build upon the materials, please use the BibTeX entry below to cite the original paper (not only this web link).

@article{Svabensky2021dataset,
    author    = {\v{S}v\'{a}bensk\'{y}, Valdemar and Vykopal, Jan and Seda, Pavel and \v{C}eleda, Pavel},
    title     = {{Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training}},
    journal   = {Data in Brief},
    publisher = {Elsevier},
    volume    = {38},
    year      = {2021},
    issn      = {2352-3409},
    url       = {https://doi.org/10.1016/j.dib.2021.107398},
    doi       = {10.1016/j.dib.2021.107398},
}

The data were collected using a logging toolset referenced here.

Attached content

  1. Dataset (data.zip). The collected data are attached here on Zenodo. A copy is also available in this repository.
  2. Analytical tools (toolset.zip). To analyze the data, you can instantiate the toolset or this project for ELK.

Version history

  • Version 1 (https://zenodo.org/record/5137355) contains 13446 log records from 175 trainees. These data are precisely those that are described in the associated journal paper. Version 1 provides a snapshot of the state when the article was published.
  • Version 2 (https://zenodo.org/record/5517479) contains 13446 log records from 175 trainees. The data are unchanged from Version 1, but the analytical toolset includes a minor fix.
  • Version 3 (https://zenodo.org/record/6670113) contains 21762 log records from 275 trainees. It is a superset of Version 2, with newly collected data added to the dataset.
  • The current Version 4 (https://zenodo.org/record/8136017) contains 21459 log records from 275 trainees. Compared to Version 3, we cleaned 303 invalid/duplicate command records.

Notes

This research was supported by ERDF project CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence (No. CZ.02.1.01/0.0/0.0/16_019/0000822).

Files

data.zip

Files (516.1 kB)

Name Size Download all
md5:a11b58d28a4c7d16482e84ed9540e238
411.7 kB Preview Download
md5:f438f6d86f29eaf6471ad8374d37e625
104.4 kB Preview Download

Additional details

Related works

Is supplement to
Journal article: 10.1016/j.dib.2021.107398 (DOI)