Table 2.
Examples of cybersecurity data sources
| Type | Platforms | Metadata | Data source | Description |
|---|---|---|---|---|
| External | Shodan, Censys, Fofsa, BinaryEdge | IP, banner data, images | IoT search engines | Search engines of publicly accessible IoT devices |
| Hansa, DreamMarket | Product/author name, price | DarkNet marketplaces | Markets for illicit goods | |
| EMBER, VirusTotal | Hash, binary, date, malware reports | Malware Repositories | Sites collecting malware reports | |
| Internal | File store, disk drives, file directories | File size, directory name, file name, directory size | File store, disk drives, file directories | Devices that store data from users and networks |
| BurpSuite, Nessus, Qualys, OpenVAS | Name, severity, risk | Vulnerability assessment | Reports from vulnerability scanning tools | |
| Docker, containers, VMware | Operating system, applications, file systems | Workstations and virtual machines | Computational machines |