Beer, FrankHofer, TimKarimi, DavidBühler, UlrichMüller, PaulNeumair, BernhardRaiser, HelmutDreo Rodosek, Gabi2017-06-202017-06-202017978-3-88579-665-7As the current cyber threat landscape is becorning more depressing, sophisticated intru­sion detection systems must evolve to protect network infrastructures efficiently. Building such a detector is highly data-driven and requires quality datasets to evaluate different phases in both the development and deployment process. However, finding publicly available captures with a ground truth is challenging. Most existing datasets focus on very specific subjects such as botnet, flooding, or brute-force traffic rather than providing a broad arsenal of different attack vectors threatening today's networks. This work addresses this gap by introducing a new attack composition compris­ing a multitude of classic as well as state-of-the-art attacks. The dataset embrace rich and untreated packet traces including payload, collected log events, and a detailed ground truth. lntitial results re­veal the proposed captures complement existing traces and provide a sound base for various rnining applications in the field of network security research.enAttack datasetdata sharingground truthintrusion detectionnetwork securityA new Attack Composition for Network SecurityText/Conference Paper1617-5468