Hacking is unauthorized access to computer systems for discovering vulnerabilities. Hacking culture emerged in 1950s-1960s as computer enthusiasts. Hacking has evolved from creative problem-solving to ethical and malicious activities
A vulnerability is a weakness that can be exploited by cybercriminals. Exploitation can lead to malware installation and data theft. Vulnerabilities can be exploited through various methods like SQL injection
Malware includes viruses, worms, spyware, ransomware, adware, and trojans. Malware breaches networks through vulnerabilities or infected files. Antivirus software and firewalls protect against malware
Dataset contains benign and common attacks from July 3-7, 2017. Includes 25 user profiles across HTTP, HTTPS, FTP, SSH, and email protocols. Generated using B-Profile system for naturalistic background traffic. Contains 80+ network flow features extracted from traffic
DDoS attacks flood servers with traffic to disrupt normal operations. Attackers use compromised computers and IoT devices to create botnets. Botnets consist of infected devices controlled remotely by attackers
Exploit is a code that takes advantage of vulnerabilities for malicious purposes. Exploits aim to identify flaws, bypass security, and gain unauthorized access. Exploits can cost global economy over US$450 billion annually