1,386 Works

internet_address_census_it87n-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87c-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_survey_reprobing_it87c-20191014 (2019-10-14 to 2019-10-28)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40490 netblocks (/24 subnets) were periodically reprobed.

internet_address_survey_reprobing_it87w-20190911 (2019-09-11 to 2019-09-25)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40490 netblocks (/24 subnets) were periodically reprobed.

internet_address_history_it87w-20190911 (2016-10-03 to 2019-10-13)

University Of Southern California-Information Sciences Institute
This dataset, generated on 2019-10-28, contains all IPv4 addresses who ever responded to our ISI-west (w) censuses, starting from census it11w (internet_address_survey_it11w-20060307), e.g. it11w, it12w, ... Each IP address is given a history of replies (as a bit-string with 's representing ICMP_ECHO_REPLY received from this IP, and 's corresponding to no-replies. We also include numerical scores that are intended to reflect the likelihood that the given IP address will repond in the future. The scores...

internet_address_census_it87w-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87j-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87e-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87g-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_hitlist_it87w-20190911 (2016-10-03 to 2019-10-13)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2019-10-28, based on census data from it72w to it87w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it72w - it87w.

Internet Infrastructure Risk Economics Research Issue Brief

David Balenson, Erin Kenneallly, Erin Kenneallly, Ashley Begley, David Balenson, Christina Davis, Christina Davis, Christina Davis, Erin Kenneallly, Lucien Randazzese, Ashley Begley, Lucien Randazzese, Lucien Randazzese, Ashley Begley, Christina Davis, David Balenson, Ashley Begley, David Balenson, Lucien Randazzese, Christina Davis, Erin Kenneallly, Lucien Randazzese, David Balenson, Erin Kenneallly & Ashley Begley

NCCDC_logs_zeek-20170413 (2017-04-13 to 2017-04-15)

University Of Southern California-Information Sciences Institute
This dataset is Zeek output from packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC is a multi-day competition that specifically focuses on the operational aspects of managing and protecting an existing commercia" network infrastructure. Teams of undergraduate/graduate students are provided with a fully functional (but insecure) small business network they must secure; maintain; and defend against a live Red Team. Teams must also respond to business tasks called"inject" throughout the competition....

Cyber Risk Economics Capability Gaps Research Strategy

Erin Kenneally

Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report.

Dave Dittrich, Dave Dittrich, Erin Kenneally & Erin Kenneally

openssl

External Data Source
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Transport Layer Security (TLS) protocols (including SSLv3) as well as a full-strength general purpose cryptographic library. The OpenSSL toolkit includes: libssl (with platform specific naming): Provides the client and server-side implementations for SSLv3 and TLS. libcrypto (with platform specific naming): Provides general cryptographic and X.509 support needed by SSL/TLS but not logically part of it....

Infection Monkey

External Data Source
The Infection Monkey is an attack simulation tool designed to test networks against attackers. A self-propagating testing tool, it identifies and visualizes attack paths in your network and provides actionable steps to mitigate and stop attacks.The Infection Monkey is an open source security tool that tests a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized...

Xplico

External Data Source
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). Features - Protocols supported: HTTP, SIP, IMAP, POP, SMTP, TCP, UDP, IPv6, …; - Port Independent Protocol...

Internet Wide Amplification Survey (MaxPain)

External Data Source
The dataset consists of 20 UDP Services and 21 attack vectors. Data is collected in a JSON format with both the request and response. The dataset is composed through a custom service scanner that mimiks a single packet from an attack and records the response. Services covering: Chargen, DNS, SSDP, Portmap, SIP, TFTP, NetBIOS, MSSQL, Steam, NTP(Monlist/Readvar), SNMP, mDNS, QOTD, ICA, Sentinel, RIPv1, Quake3, CoAP, LDAP, Memcached. Notice the data collected does not include the...

Nmap

External Data Source
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It...

Dorothy2

External Data Source
Dorothy2 is a framework created for suspicious binary analysis. Its main strengths are a very flexible modular environment, and an interactive investigation framework with a particular care of the network analysis. Additionally, it is able to recognise new spawned processes by comparing them with a previously created baseline. Static binary analysis and an improved system behaviour analysis will be shortly introduced in the next versions. Dorothy2 analyses binaries by the use of pre-configured analysis profiles....

Yahoo Password Frequency Corpus

External Data Source
Each of the 51 .txt files represents one subset of all users' passwords observed during the experiment period. "yahoo-all.txt" includes all users; every other file represents a strict subset of that group. Each file is a series of lines of the format: FREQUENCY #OBSERVATIONS ... with FREQUENCY in descending order. For example, the file: 3 1 2 1 1 3 would represent a the frequency list (3, 2, 1, 1, 1), that is, one password...

Wireshark

External Data Source
Wireshark lets you see what’s happening on your network at a microscopic level and is the standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark has a rich feature set which includes the following: - Deep inspection of hundreds of protocols, with more being added all the time - Live capture and offline analysis - Standard three-pane packet browser - Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many...

Moloch

External Data Source
Moloch augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access. An intuitive and simple web interface is provided for PCAP browsing, searching, and exporting. Moloch exposes APIs which allow for PCAP data and JSON formatted session data to be downloaded and consumed directly. Moloch stores and exports all packets in standard PCAP format, allowing you to also use your favorite PCAP ingesting tools, such as...

Darknet Neural Network

External Data Source
Darknet apply a single neural network to the full image. This network divides the image into regions and predicts bounding boxes and probabilities for each region. These bounding boxes are weighted by the predicted probabilities. Darknet has several advantages over classifier-based systems. It looks at the whole image at test time so its predictions are informed by global context in the image. It also makes predictions with a single network evaluation unlike systems like R-CNN...

cowrie

External Data Source
Features Choose to run as an emulated shell (default): Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included Possibility of adding fake file contents so the attacker can cat files such as /etc/passwd. Only minimal file contents are included Cowrie saves files downloaded with wget/curl or uploaded with SFTP and scp for later inspection Or proxy SSH and telnet to another system For both settings:...

Registration Year

  • 2017
    791
  • 2018
    319
  • 2019
    275

Resource Types

  • Dataset
    1,386