Professional Documents
Culture Documents
INSPECTION
201370616 Mohamed Al Maleki
202190274 Abir Raza
INTRODUCTION
Cyber-attacks against businesses are
deliberate and motivated by financial gain,
insider threats, industrial sabotage, info-
gathering (intelligence), espionage or peer
recognition/curiosity.
CTU-13 Dataset
THE CAIDA ANONYMIZED INTERNET TRACES DATA
ACCESS
DATA EXPLORATION
THANK YOU!