1,110 Works

internet_address_survey_reprobing_it49c-20120817 (08/17/2012 to 08/31/2012)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40281 netblocks (/24 subnets) were periodically reprobed.

internet_address_survey_reprobing_it53c-20130311 (03/11/2013 to 03/25/2013)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40273 netblocks (/24 subnets) were periodically reprobed.

internet_address_census_standing_j-20091102 (11/02/2009 to 01/01/2020)

University Of Southern California-Information Sciences Institute
Applying to this standing dataset, will allow researchers to get the latest IPv4 census datasets as they become available. This subscription will last for one year, since i's approved. This standing request applies only to censuses conducted from WIDE in Fujisawa-shi, Kanagawa, Japan. Please see e.g. dataset internet_address_census_it79j-20180213 for an example of a dataset covered by this standing request.

The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background Traffic (01/01/2011 to 11/11/2007)

External Data Source
Each scenario was captured in a pcap file that contains all the packets of the three types of traffic. These pcap files were processed to obtain other type of information, such as NetFlows, WebLogs, etc. The first analysis of the CTU-13 dataset, that was described and published in the paper "An empirical comparison of botnet detection methods" used unidirectional NetFlows to represent the traffic and to assign the labels. These unidirectional NetFlows should not be...

DNS_Recursive_Study-20170323 (03/23/2017 to 03/27/2017)

University Of Southern California-Information Sciences Institute
This data set contains captures of DNS queries towards a test domain with 7 different setups of authoritative servers. It contains DNS queries captured at the authoritatives (in PCAP format) as well as the measurement data (in JSON format) of the RIPE Atlas Probes.

internet_address_hitlist_it76w-20170628 (08/29/2014 to 07/30/2017)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2017-08-29, based on census data from it61w to it76w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it61w - it76w.

internet_address_census_it75n-20170427 (04/27/2017 to 05/29/2017)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

KDD Cup 1999 Data

External Data Source
This is the data set used for intrusion detector learning task in the Third International Knowledge Discovery and Data Mining Tools Competition, which was held in conjunction with KDD-99, The Fifth International Conference on Knowledge Discovery and Data Mining. The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between ``bad'' connections, called intrusions or attacks, and ``good'' normal connections. The 1998 DARPA Intrusion Detection Evaluation Program was...

internet_address_census_it81c-20180625 (06/25/2018 to 07/27/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

IPv6 Topology (12/12/2008 to 01/01/2020)

UCSD-Center For Applied Internet Data Analysis
This dataset contains information useful for studying the IP and AS topology of the IPv6 Internet, collected by a globally distributed set of Ark monitors. Data collected for each path probed includes: RTTs for intermediate hops and destination - IPID, TOS, TTL and size fields of response packets - IP length, TTL and TOS fields of probe packet, ICMP type and code of responses.

internet_address_survey_reprobing_it30c-20100106 (01/06/2010 to 01/20/2010)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 22381 netblocks (/24 subnets) were periodically reprobed.

internet_address_hitlist_it49w-20120731 (07/07/2010 to 09/02/2012)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2012-09-14, based on census data from it34w to it49w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it34w - it49w.

The kyutech/interference dataset

External Data Source
The common wisdom tells one not to attach more than 5-10 wireless devices to an access point. This is a problem in wireless educational classes, one can get between 10 and 50 students in the same room. Such spaces are referred to as dense wireless networks. While there are several methods that can be used to deal with dense wireless environments, installing multiple APs and separating them by channel is arguably the most readily available...

usc_lander_passive_active-20060919 (09/19/2006 to 10/07/2006)

University Of Southern California-Information Sciences Institute
This dataset consists of passively collected traffic from the LANDER project and active nmap probe data collected at the USC campus.

internet_address_hitlist_it33w-20100514 (09/14/2007 to 06/14/2010)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2010-08-30, based on census data from it18w to it33w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it18w - it33w.

internet_address_survey_reprobing_it79w-20180213 (02/13/2018 to 02/27/2018)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40493 netblocks (/24 subnets) were periodically reprobed.

DITL_B_Root_message_question-20160405x (04/05/2016 to 04/07/2016)

University Of Southern California-Information Sciences Institute
This is a collection of DNS requests host-only anonymized IP collected at B root. DNS payload is parsed and saved in a text form. For a datasets containing raw PCAP data, please see a companion dataset LANDER:DITL_B_Root-20160405 . The data was collected as part of Day in the Life of the Internet effort (DITL).

internet_address_hitlist_it28w-beta-20090914 (06/16/2006 to 10/14/2009)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2010-02-17, based on census data from it13w to it28w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it13w - it28w.

internet_outage_adaptive_a23g-20160101 (01/01/2016 to 04/01/2016)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a31c-20180101 (01/01/2018 to 04/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_address_census_it46w-20120309 (03/09/2012 to 04/11/2012)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

IP Web Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Days Unresolved, Insidents Reported, Attacker IP, Network, Reported Emails, Last Calculated: Rank– Rank of IP web Abuse Days Unresolved- number of days unresolved Insidents Reported –amount of insidents reported Attacker IP- Specific IP of abuse attcker ;

internet_address_census_it81w-20180625 (06/25/2018 to 07/27/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

The mit/reality dataset

External Data Source
The authors have captured communication, proximity, location, and activity information from 100 subjects at MIT over the course of the 2004-2005 academic year. This data represents over 350,000 hours (~40 years) of continuous data on human behavior. Such rich data on complex social systems have implications for a variety of fields. ; nathan@media.mit.edu

Rapid7 Heisenberg Cloud Honeypot cowrie Logs

External Data Source
This is an extract from Rapid7's Heisenberg Cloud global network of honeypot agents. It contains log entries from connection attempts to the cowrie honeypot agent running in Heisenberg Cloud and spans November 1, 2016 through November 30, 2016. Honeypot destination node information is limited to the agent identifier (to preserve the anonymity of the external honeypot IP addresses) but source IPv4 data, source port, destination port and other interaction information is provided. The bzip2 archive...

Registration Year

  • 2017
    791
  • 2018
    319

Resource Types

  • Dataset
    1,110

Data Centers

  • Information Marketplace for Policy and Analysis of Cyber-Risk & Trust (IMPACT)
    1,110