Category | Version / Phase Timeline | Specific Threats, Attacks & Features | Version / Phase Timeline | Specific Threats & Attacks |
1: Network Traffic | Version 2.0 / Phase 1 Q4 2025 | Unified Host & Network Analysis | ||
User-Computer Authentication | ||||
Network Intrusion Simulation (Military Simulation) | ||||
Web Server Data Set (Cable Bound & Wifi Services) | ||||
Botnet, Normal & Background Traffic Data Set | ||||
Malware Traffic, Network Forensics, SCADA/ICS Network Captures, Packet Injection Attacks/Man-on-the-Side Attacks | ||||
PCAP Data Training | ||||
IoT Device Communications | ||||
2: Malware | Version 1.0 / Phase 1 Q2 2025 | Fuzzers | Version 2.0 / Phase 2 In The Near Future | Open Source Intrusion Detection System |
Analysis | Opfake | |||
Backdoors | FakeInst | |||
Denial of Service (DoS) | DroidKungFu | |||
Exploits | BaseBridge | |||
Generic | Gappusin | |||
Reconnaissance | ||||
Shellcode | ||||
Worms | ||||
3: Software | Version 1.0 / Phase 2 Q3 2025 | JavaScript-Based Vulnerabilities | Version 2.0 / Phase 2 In The Near Future | Snort Intrusion Detection Logs, Domain Name Service Logs, Web Server Logs, Log Server Aggregate Logs |
Scan HTTP headers | ||||
ISOT Interactions | ||||
Training On Phishing Websites | ||||
4: Web Apps | Version 1.0 / Phase 2 Q3 2025 | Application Attack Payloads | Version 2.0 / Phase 2 In The Near Future | Web Attack Payloads |
Wide Scan Data Repositories | ||||
Application Firewalls | Web Logs | |||
Crawlers | ||||
5: URLs and Domain Names | Version 1.0 / Phase 2 Q3 2025 | Malicious URLs | Version 2.0 / Phase 2 In The Near Future | Cybercrime Tracker |
Malware Domain List Mapping | ||||
Malicious URLs (IPV6) | ||||
Spam | ||||
6: Host | Version 2.0 / Phase 2 In The Near Future | Public Security Log Sharing Websites | ||
7: Email | Version 2.0 / Phase 2 In The Near Future | Spam Email Identifiers | ||
8: Fraud | Version 2.0 / Phase 2 In The Near Future | Credit Card Fraud Detection | ||
9: Honeypots | Version 2.0 / Phase 2 In The Near Future | Distributed Denial of Service (DDoS) | ||
10: Binaries | Version 2.0 / Phase 2 In The Near Future | Executable Files Causing Issues | ||
11: Phishing | Version 2.0 / Phase 2 In The Near Future | Phishing Attacks | ||
12: Passwords Frequency | Version 2.0 / Phase 2 In The Near Future | Password Frequency Mapping |
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article