Abstract: Current cybersecurity research often utilizes battle tested and overused datasets for experimentation, validation, and development of research, tools, and defense systems. Furthermore, ...