1,386 Works

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild

Mattijs Jonker

WarChild

External Data Source
Warchild is a denial of service testing suite made for analysing the strength of your websiteagainst different kinds of denial of service attacks you will be facing which are mainly organised by crooks to cause damage to your website. Overview This Denial Of Service suite comprises of the following features : CloudBust :- Cloudbust a.k.a AETHON is a cloudflare resolver that looks into the cloudflare protectedwebsite for misconfigured DNS configurationbasically uses dnsdumpster.com as its resolver...

internet_outage_survey_it42w-20110726 (07/26/2011 to 08/08/2011)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, approximately 20k /24 subnets were periodically reprobed. Outages are analyzed and reported on the responses.

CAIDA UCSD Network Telescope Daily Randomly and Uniformly Spoofed Denial-of-Service (RSDoS) Attack Metadata (2008-10-01 to 2019-06-24)

UCSD-Center For Applied Internet Data Analysis
This dataset is aggregated from the unidirectional unsolicited IPv4 traffic reaching the UCSD Network Telescope. From the raw traffic data, we extract the backscatter (response) packets sent by victims of randomly and uniformly spoofed DoS attacks, summarize activity that relates to the same victim in an 'attack vector', and produce a single CSV file of attack vectors per day. The attack vector consists of a target IP address, statistical information about the attack, and geolocation...

IoT_Bootup_Traces-20181107 (2018-11-07 to 2018-11-09)

University Of Southern California-Information Sciences Institute
First-time boot-up traffic of multiple IoT devices located in a LAN network. Traces are captured at LAN port of the LAN router.

Provider Net Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

Reverse DNS (RDNS) -- 2013-2017 (2013-01-01 to 1905-07-09)

External Data Source
This dataset includes the responses to the IPv4 PTR lookups for all non-blacklisted/private IPv4 addresses. Please note that effective February 2017, this study has been deprecated in favor of https://opendata.rapid7.com/sonar.rdns_v2/ ; research@rapid7.com

Captured File Feed

External Data Source
Captured file feed contains a log of our reports and status of the issue reported. This feed is filterable by File MD5, File Mine Type, Captured Type, Associated URL, File Size, Captured Time. Fields: File MD5– Contains the Identification ID. File Mine Type- identifying files on the Internet according to their nature and format Captured Type – extracted or uploaded Associated URL – Specific URL assocaited with attack File Size –size of file of captured...

National Exposure Scans

External Data Source
The dataset represents the raw data collected that was used in the production of Rapid7's 2016-2018 National Exposure report (https://github.com/rapid7/data/tree/master/national-exposure). Each file here contains the IPv4 addresses that responded positively to a particular TCP or UDP probe used in that respective year's analysis. ; research@rapid7.com

CyberVAN

External Data Source
CyberVAN provides the highest fidelity representation of a network next to actually deploying the real network, by representing the network in a discrete event network simulator, and enabling hosts represented by virtual machines (VMs) to communicate over this simulated network. CyberVAN provides the highest fidelity representation of a network next to actually deploying the real network, by representing the network in a discrete event network simulator, and enabling hosts represented by virtual machines (VMs) to...

Auto-labeled Corpus

External Data Source
This corpus was generated and first used in the following paper, which provides many additional details. Bridges, Robert A., et al. "Automatic Labeling for Entity Extraction in Cyber Security.” accepted The Third ASE International Conference on Cyber Security 2014. Preprint arXiv preprint arXiv:1308.4941 (2013). The src/python/tagging directory contains scripts to generate and tag the initial corpus, using various heuristics. The src/python/learning directory contains scripts to generate a model from the tagged corpus, and then evaluate...

FuzzSim: Black-box Fuzzing Simulator

External Data Source
Black-box mutational fuzzing is an effective, albeit simple, way to find bugs in software. Given a set of fuzzing configurations, which can be thought of as pairs of programs and seeds, FuzzSim evaluates various methods for scheduling the fuzzing of these pairs. The key feature of the system is that comprehensive data on fuzzing all pairs is obtained in advance, so that any scheduling algorithm's performance can be observed without duplication of fuzzing effort. Thus,...

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

External Data Source
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob’s name to a public key, and if a remote entity can prove knowledge of Bob’s private key, then (barring key compromise) that remote entity must be Bob. However, in reality, many websites—and the majority of the most popular ones—are hosted at least in part by third parties such as Content Delivery Networks (CDNs) or web hosting providers....

IP Web Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Days Unresolved, Insidents Reported, Attacker IP, Network, Reported Emails, Last Calculated: Rank– Rank of IP web Abuse Days Unresolved- number of days unresolved Insidents Reported –amount of insidents reported Attacker IP- Specific IP of abuse attcker ;

IP Net Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

Understanding and Monitoring Embedded Web Scripts

External Data Source
ScriptInspector assists site administrators in understanding, monitoring, and restricting the behavior of third-party scripts embedded in their site. ScriptInspector is a modified browser that can intercept, record, and check third-party script accesses to critical resources against security policies. ;

BOT NETWORK FEED

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

Provider Web Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

HTTP GET Responses

External Data Source
Ths dataset contains the responses to HTTP/1.1 GET requests performed against a variety of IPv4 public HTTP endpoints ; research@rapid7.com

Security Challenges in an Increasingly Tangled Web Crawls (2016-10-05 to 2016-07-10)

External Data Source
Crawl of the Alexa Top Million domains from October 5-7, 2016 using ZBrowse, a headless Chrome browser instrumented to track object dependencies. The dataset contains one JSON blob per website, and presents the dependencies loaded by the website in a tree structure. ; team@censys.io

IPv4 HTTP Scans

External Data Source
This dataset contains scanning data from Project 25499. The files are in pairs, one contains the raw output from ZMap and the second conains JSON objects with any collected data ; questons@project25499.com

Scan for AXFR DNS replies

External Data Source
AXFR is a feature of DNS that is usually not meant to be publicly accessible. However a large number of DNS servers answer to AXFR requests, most of them probably due to misconfiguration. ; hanno@hboeck.de

Forward DNS (FDNS) -- ANY 2014-2017 (2014-01-01 to 1905-07-09)

External Data Source
This dataset contains the responses to DNS 'ANY' requests for all forward DNS names known by Rapid7's Project Sonar. The file is a GZIP compressed file containing the name, type, value and timestamp of any returned records for a given name in JSON format. Please note that effective February 2017, this study has been deprecated in favor of https://opendata.rapid7.com/sonar.fdns_v2/ ; research@rapid7.com

SSL Certificates

External Data Source
The dataset contains a collection of metadata related to the net new X.509 certificates observed in each study when considering all SSL studies that ran prior. The _hosts and _endpoints files provide mapping between the IPs/endpoints and the fingerprint of the X.509 certificate presented. The _certs file provides a mapping of the net new certificates from a given study and the corresponding fingerprint. The _names file provides a mapping of the X.509 certificate name (CN)...

More SSL Certificates (non-443)

External Data Source
The dataset contains a collection of metadata related to the net new X.509 certificates observed in each study when considering all SSL studies that ran prior. The _hosts and _endpoints files provide mapping between the IPs/endpoints and the fingerprint of the X.509 certificate presented. The _certs file provides a mapping of the net new certificates from a given study and the corresponding fingerprint. The _names file provides a mapping of the X.509 certificate name (CN)...

Registration Year

  • 2017
    791
  • 2018
    319
  • 2019
    275

Resource Types

  • Dataset
    1,386