Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training

Investor logo

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Institute of Computer Science. Official publication website can be found on muni.cz.
Authors

ŠVÁBENSKÝ Valdemar VYKOPAL Jan ŠEDA Pavel ČELEDA Pavel

Year of publication 2021
Type Article in Periodical
Magazine / Source Data in Brief
MU Faculty or unit

Institute of Computer Science

Citation
Web Published version on Elsevier ScienceDirect
Doi http://dx.doi.org/10.1016/j.dib.2021.107398
Keywords cybersecurity education; cybersecurity exercise; Linux shell; Metasploit; command-line history; host-based data collection; educational data mining; learning analytics
Attached files
Description We present a dataset of 13446 shell commands from 175 participants who attended cybersecurity training and solved assignments in the Linux terminal. Each acquired data record contains a command with its arguments and metadata, such as a timestamp, working directory, and host identification in the emulated training infrastructure. The commands were captured in Bash, ZSH, and Metasploit shells. The data are stored as JSON records, enabling vast possibilities for their further use in research and development. These include educational data mining, learning analytics, student modeling, and evaluating machine learning models for intrusion detection. The data were collected from 27 cybersecurity training sessions using an open-source logging toolset and two open-source interactive learning environments. Researchers and developers may use the dataset or deploy the learning environments with the logging toolset to generate their own data in the same format. Moreover, we provide a set of common analytical queries to facilitate the exploratory analysis of the dataset.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.