1,352 Works

internet_outage_adaptive_a36c-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a36n-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a36all-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
Combined reachability information for over 3.5M /24 subnets; this dataset is created by post-processing data from datasets internet_outage_adaptive_a36c-20190401 internet_outage_adaptive_a36e-20190401 internet_outage_adaptive_a36g-20190401 internet_outage_adaptive_a36j-20190401 internet_outage_adaptive_a36n-20190401 internet_outage_adaptive_a36w-20190401

internet_outage_adaptive_a36w-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a36j-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a36g-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a36e-20190401 (2019-04-01 to 2019-07-01)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_address_history_it83w-20181031 (2016-01-21 to 2018-12-02)

University Of Southern California-Information Sciences Institute
This dataset, generated on 2018-12-13, contains all IPv4 addresses who ever responded to our ISI-west (w) censuses, starting from census it11w (internet_address_survey_it11w-20060307), e.g. it11w, it12w, ... Each IP address is given a history of replies (as a bit-string with 's representing ICMP_ECHO_REPLY received from this IP, and 's corresponding to no-replies. We also include numerical scores that are intended to reflect the likelihood that the given IP address will repond in the future. The scores...

Real Data Corpus - Naval Postgraduate School (2006-01-01 to 2014-12-31)

Naval Postgraduate School
Real Data Corpus The Real Data Corpus (RDC) is a collection of disk images extracted from secondary storage devices that were acquired from second-hand markets around the world. In total, the RDC currently consists of 58 TiB of data contained in 3,127 disk images from 29 countries. A variety of devices are represented, including magnetic media and solid state storage from laptops, desktops, mobile phones, USB memory sticks, and other media. The dataset is hosted...

iperf_emulated_attacks-20090621 (06/21/2009 to 08/04/2009)

University Of Southern California-Information Sciences Institute
These traces were created by monitoring an emulated DoS attack from a single known source to single known target, mixed with ongoing traffic into a large enterprise. The attack was generated with Iperf sending UDP packets at a known rate. Data was collected in the middle of the network, close to the target, at the network connection for USC.

internet_address_survey_reprobing_it82w-20180904 (09/04/2018 to 09/18/2018)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40491 netblocks (/24 subnets) were periodically reprobed.

Cyber Risk Economics Capability Gaps Research Strategy

Erin Kenneally

internet_address_census_it85j-20190417 (2019-04-17 to 2019-05-20)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

PhishTank

External Data Source
PhishTank is a collaborative clearing house for data and information about phishing on the Internet. Also, PhishTank provides an open API for developers and researchers to integrate anti-phishing data into their applications at no charge.

conpot

External Data Source
ConpotFS designed to have “safe to use” os.* wrappers that could be used by protocols. We cannot allow chmod() like commands that may allow attackers to make arbitrary system calls. At the same time - protocols such as FTP need chmod() like methods. Same goes for stat() etc. For this reason, we needed a file system that can operate on a layer above the actual file system and still provide the flexibility/robustness. The Conpot’s file...

Moloch

External Data Source
Moloch augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access. An intuitive and simple web interface is provided for PCAP browsing, searching, and exporting. Moloch exposes APIs which allow for PCAP data and JSON formatted session data to be downloaded and consumed directly. Moloch stores and exports all packets in standard PCAP format, allowing you to also use your favorite PCAP ingesting tools, such as...

Infection Monkey

External Data Source
The Infection Monkey is an attack simulation tool designed to test networks against attackers. A self-propagating testing tool, it identifies and visualizes attack paths in your network and provides actionable steps to mitigate and stop attacks.The Infection Monkey is an open source security tool that tests a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized...

openssl

External Data Source
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Transport Layer Security (TLS) protocols (including SSLv3) as well as a full-strength general purpose cryptographic library. The OpenSSL toolkit includes: libssl (with platform specific naming): Provides the client and server-side implementations for SSLv3 and TLS. libcrypto (with platform specific naming): Provides general cryptographic and X.509 support needed by SSL/TLS but not logically part of it....

Xplico

External Data Source
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). Features - Protocols supported: HTTP, SIP, IMAP, POP, SMTP, TCP, UDP, IPv6, …; - Port Independent Protocol...

Internet Wide Amplification Survey (MaxPain)

External Data Source
The dataset consists of 20 UDP Services and 21 attack vectors. Data is collected in a JSON format with both the request and response. The dataset is composed through a custom service scanner that mimiks a single packet from an attack and records the response. Services covering: Chargen, DNS, SSDP, Portmap, SIP, TFTP, NetBIOS, MSSQL, Steam, NTP(Monlist/Readvar), SNMP, mDNS, QOTD, ICA, Sentinel, RIPv1, Quake3, CoAP, LDAP, Memcached. Notice the data collected does not include the...

Justniffer

External Data Source
Justniffer can emulate Apache web server log files, track response times and extract all "intercepted" files from the HTTP traffic. It lets you interactively trace tcp traffic from a live network or from a previously saved capture file. Justniffer's native capture file format is libpcap format, which is also the format used by tcpdump and various other tools. Justniffer captures reassembles and reorders TCP packets, performs IP packet defragmentation and displays the tcp flow in...

Nmap

External Data Source
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It...

Yahoo Password Frequency Corpus

External Data Source
Each of the 51 .txt files represents one subset of all users' passwords observed during the experiment period. "yahoo-all.txt" includes all users; every other file represents a strict subset of that group. Each file is a series of lines of the format: FREQUENCY #OBSERVATIONS ... with FREQUENCY in descending order. For example, the file: 3 1 2 1 1 3 would represent a the frequency list (3, 2, 1, 1, 1), that is, one password...

Dorothy2

External Data Source
Dorothy2 is a framework created for suspicious binary analysis. Its main strengths are a very flexible modular environment, and an interactive investigation framework with a particular care of the network analysis. Additionally, it is able to recognise new spawned processes by comparing them with a previously created baseline. Static binary analysis and an improved system behaviour analysis will be shortly introduced in the next versions. Dorothy2 analyses binaries by the use of pre-configured analysis profiles....

Wireshark

External Data Source
Wireshark lets you see what’s happening on your network at a microscopic level and is the standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark has a rich feature set which includes the following: - Deep inspection of hundreds of protocols, with more being added all the time - Live capture and offline analysis - Standard three-pane packet browser - Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many...

Registration Year

  • 2017
    791
  • 2018
    319
  • 2019
    241

Resource Types

  • Dataset
    1,352