Home
About
Our Team
Contact
Sebastian Garcia
Veronica Valeros
Datasets
CTU-13 Dataset
IoT-23 Dataset
Hornet: Network Dataset of Geographically Placed Honeypots
Datasets Overview
Malware Captures
Normal Captures
Mixed Captures
Malware on IoT Dataset
Android Mischief Dataset
F.A.Q.
Stratosphere IPS
Stratosphere IPS
Technology
Stratosphere IPS for Linux
Stratosphere Testing Framework
Download
Kalipso
Projects
AI Dojo
GSoC
Defensive LLMs
Cybercrime Research
Aposemat Project
Civilsphere
Civilsphere AI-VPN
Project Ludus
ManaTI
Nomad
Thesis Projects
A Study of RATs
A Study of IoT Malware
Icarus Project
AD-Honeypot Evasion Game
The Blocklist Generation Project
Stratosphere IPS
FEEL Project
Tools
Should I Click
Hexa Payload Decoder
Zeek Anomaly Detector
Zeek IRC Feature Extractor
AIP Tool
Publications
Open Positions
Research Blog

Stratosphere IPS

Home
About
Our Team
Contact
Sebastian Garcia
Veronica Valeros
Datasets
CTU-13 Dataset
IoT-23 Dataset
Hornet: Network Dataset of Geographically Placed Honeypots
Datasets Overview
Malware Captures
Normal Captures
Mixed Captures
Malware on IoT Dataset
Android Mischief Dataset
F.A.Q.
Stratosphere IPS
Stratosphere IPS
Technology
Stratosphere IPS for Linux
Stratosphere Testing Framework
Download
Kalipso
Projects
AI Dojo
GSoC
Defensive LLMs
Cybercrime Research
Aposemat Project
Civilsphere
Civilsphere AI-VPN
Project Ludus
ManaTI
Nomad
Thesis Projects
A Study of RATs
A Study of IoT Malware
Icarus Project
AD-Honeypot Evasion Game
The Blocklist Generation Project
Stratosphere IPS
FEEL Project
Tools
Should I Click
Hexa Payload Decoder
Zeek Anomaly Detector
Zeek IRC Feature Extractor
AIP Tool
Publications
Open Positions
Research Blog
Network Security Dataset Creation
May 13, 2025
Thesis
Ondřej Lukas
Network Security Dataset Creation
Ondřej Lukas
May 13, 2025
Thesis

Network Security Dataset Creation

Ondřej Lukas
May 13, 2025
Thesis

Stratosphere Laboratory has a large collection of real network traffic, which can be annotated, filtered, and analyzed to create a high-quality dataset for research and evaluation of detection methods. This topic is suitable for both bachelor's and master's students who enjoy data analysis, tooling, and evaluation pipelines

Tagged: Cybersecurity, Datasets

Newer PostLLM-based Honeypots

Protecting the civil society through high quality research

Back to Top
Karlovo náměstí, Praha, Czech Republicstratosphere@aic.fel.cvut.cz

Powered by Squarespace