diff --git a/404.html b/404.html index 9bdd8ea..0c75f14 100644 --- a/404.html +++ b/404.html @@ -7,7 +7,4 @@

Whoops, this page doesn't exist.

Move along. (404 error)

-
- - Not found
diff --git a/assets/img/404-southpark.jpg b/assets/img/404-southpark.jpg deleted file mode 100644 index 354eb12..0000000 Binary files a/assets/img/404-southpark.jpg and /dev/null differ diff --git a/assets/img/cic_ids_2017_diagram.png b/assets/img/cic_ids_2017_diagram.png deleted file mode 100644 index dc4f6cf..0000000 Binary files a/assets/img/cic_ids_2017_diagram.png and /dev/null differ diff --git a/assets/img/cic_ids_2017_diagram.svg b/assets/img/cic_ids_2017_diagram.svg new file mode 100644 index 0000000..c929acb --- /dev/null +++ b/assets/img/cic_ids_2017_diagram.svg @@ -0,0 +1,4 @@ + + + +
Win 7 Pro
Win 8.1
Win Vista
Win 10 64B
Win 10 32B
MacBook
Capturing
Server
Ubuntu 14.4 32B
Ubuntu 14.4 64B
Ubuntu 16.4 32B
Ubuntu 16.4 64B
Ubuntu 16
Webserver
Ubuntu 12
Webserver
DC/DNS
Server
Win 8.1
Victim Network
Win 8.1
Win 8.1
Kali Linux
Attacker Network
\ No newline at end of file diff --git a/assets/img/cse_cic_ids_2018_diagram.png b/assets/img/cse_cic_ids_2018_diagram.png deleted file mode 100644 index 0ef89a0..0000000 Binary files a/assets/img/cse_cic_ids_2018_diagram.png and /dev/null differ diff --git a/assets/img/cse_cic_ids_2018_diagram.svg b/assets/img/cse_cic_ids_2018_diagram.svg new file mode 100644 index 0000000..bf99b80 --- /dev/null +++ b/assets/img/cse_cic_ids_2018_diagram.svg @@ -0,0 +1,4 @@ + + + +
Win 8
Win 10
Win 8
Win 10
Department 1
100 machines
Win 8
Win 10
Win 8
Win 10
Department 2
100 machines
Win 8
Win 10
Win 8
Win 10
Department 3
100 machines
Win 8
Win 10
Win 8
Win 10
Department 4
100 machines
Department 5
20 machines
Servers
30 machines
Ubuntu
Ubuntu
App Server
File Server
AD Server
ADD Server
Email
Server
Ubuntu
Win 8
Win 10
Win 8
Win 10
Attacker Network
50 machines
Ubuntu
Ubuntu
AWS
\ No newline at end of file diff --git a/assets/img/ngids_ds.png b/assets/img/ngids_ds.png deleted file mode 100644 index 0dd1f03..0000000 Binary files a/assets/img/ngids_ds.png and /dev/null differ diff --git a/assets/img/ngids_ds.svg b/assets/img/ngids_ds.svg new file mode 100644 index 0000000..4891e90 --- /dev/null +++ b/assets/img/ngids_ds.svg @@ -0,0 +1,4 @@ + + + +
Network 1
Network 2
Machine A
Machine B
IXIA Perfect Storm Traffic Generator
Internet
Host
Data
Network
Data
Ground
Truth
NGIDS-DS
\ No newline at end of file diff --git a/assets/img/pwnjutsu_infrastructure.png b/assets/img/pwnjutsu_infrastructure.png deleted file mode 100644 index f523dfd..0000000 Binary files a/assets/img/pwnjutsu_infrastructure.png and /dev/null differ diff --git a/assets/img/unsw_nb15_network_architecture.jpeg b/assets/img/unsw_nb15_network_architecture.jpeg deleted file mode 100644 index 6941fe4..0000000 Binary files a/assets/img/unsw_nb15_network_architecture.jpeg and /dev/null differ diff --git a/assets/img/unsw_nb15_network_architecture.svg b/assets/img/unsw_nb15_network_architecture.svg new file mode 100644 index 0000000..da4e88e --- /dev/null +++ b/assets/img/unsw_nb15_network_architecture.svg @@ -0,0 +1,4 @@ + + + +
Server 2
(Malicious)
Server 1
Server 3
IXIA Traffic Generator
Unspecified
Client Network
Unspecified
Client Network
Router 1
Router 2
pcaps
\ No newline at end of file diff --git a/content/datasets/cic_ids2017.md b/content/datasets/cic_ids2017.md index f3a2b53..dcfaabe 100644 --- a/content/datasets/cic_ids2017.md +++ b/content/datasets/cic_ids2017.md @@ -47,7 +47,7 @@ It is the predecessor to the CDE CIC IDS2018 dataset. The network is divided into a separate victim and attacker network, each consisting of multiple machines, running various Versions of Windows and Linux, as well as macOS. -![CIC IDS 2017 Network Diagram]({{ "/assets/img/cic_ids_2017_diagram.png" | relative_url }}) +![CIC IDS 2017 Network Diagram]({{ "/assets/img/cic_ids_2017_diagram.svg" | relative_url }}) ### Activity diff --git a/content/datasets/cse_cic_ids2018.md b/content/datasets/cse_cic_ids2018.md index c38a724..b344f22 100644 --- a/content/datasets/cse_cic_ids2018.md +++ b/content/datasets/cse_cic_ids2018.md @@ -48,7 +48,7 @@ An overview is provided by the diagram below (image quality courtesy of the auth Presumably, vulnerable software versions have been installed to facilitate certain exploits, but this is more... suggested than specified in their description. -![CIC IDS 2018 Network Diagram]({{ "/assets/img/cse_cic_ids_2018_diagram.png" | relative_url }}) +![CIC IDS 2018 Network Diagram]({{ "/assets/img/cse_cic_ids_2018_diagram.svg" | relative_url }}) ### Activity diff --git a/content/datasets/nigds_dataset.md b/content/datasets/nigds_dataset.md index 7d40cd5..8b78052 100644 --- a/content/datasets/nigds_dataset.md +++ b/content/datasets/nigds_dataset.md @@ -56,7 +56,7 @@ specifically measure this. The simulation is divided into networks 1 and 2, with 1 representing the main work environment, and 2 acting as critical infrastructure of a given enterprise, depicted in the picture below. -![NGIDS Network Diagram]({{ "/assets/img/ngids_ds.png" | relative_url }}) +![NGIDS Network Diagram]({{ "/assets/img/ngids_ds.svg" | relative_url }}) Machine A collects host logs, while machine B collects network packets (as pcaps) moving from network 1 to network 2. diff --git a/content/datasets/pwnjutsu.md b/content/datasets/pwnjutsu.md index 48c5c40..112e998 100644 --- a/content/datasets/pwnjutsu.md +++ b/content/datasets/pwnjutsu.md @@ -39,10 +39,8 @@ The host and network logs extracted from this process form the PWNJUTSU dataset. The main drawback, however, is that the resulting logs are not labeled. ### Environment -Infrastructure was deployed in a virtualized way on a dedicated server, depicted below. -Each participant was designated a separate network instance within this infrastructure, consisting of one gateway and three machines ("level 1-3"), which the participant had to move through laterally. - -![PWNJUTSU Infrastructure]({{ "/assets/img/pwnjutsu_infrastructure.png" | relative_url }}) +The entire infrastructure was deployed in a virtualized way on a dedicated server, hosting administrative services as well as several small networks. +Each participant was designated one such network instance within this infrastructure, consisting of one gateway and three machines ("level 1-3"), which the participant had to move through laterally. Each set of three vulnerable machines runs Ubuntu 14.04, Windows 2008, and Ubuntu 20.04, respectively. The first two machines are derivations of the Metasploitable 3 project, while the third (Ubuntu 20.04) is "custom", with four distinct vulnerabilities: diff --git a/content/datasets/unsw_nb15.md b/content/datasets/unsw_nb15.md index 0e5b3f6..e6e4826 100644 --- a/content/datasets/unsw_nb15.md +++ b/content/datasets/unsw_nb15.md @@ -43,7 +43,7 @@ The general setup consists of three virtual servers, two routers and an unspecif Server 1 and 3 generate normal traffic, while server 2 generates malicious traffic. The paper lists the number of "distinct IP addresses" as 45, but the total number of machines is most definitely lower. -![UNSW-NB15 Network Architecture]({{ "/assets/img/unsw_nb15_network_architecture.jpeg" | relative_url }}) +![UNSW-NB15 Network Architecture]({{ "/assets/img/unsw_nb15_network_architecture.svg" | relative_url }}) It seems to be implied that all traffic from router 2 is (also?) passed to router 1, where all traffic is dumped in the form of pcaps. Section 4.A is not entirely clear in this regard.