1,214 Works

internet_address_survey_reprobing_it85c-20190507 (2019-05-07 to 2019-05-21)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40490 netblocks (/24 subnets) were periodically reprobed.

internet_outage_adaptive_a18j-20141001 (10/01/2014 to 12/31/2014)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_address_survey_reprobing_it26w-20090527 (05/27/2009 to 06/10/2009)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 22371 netblocks (/24 subnets) were periodically reprobed.

Valuing Cyber Security Research Datasets

Tyler Moore, Erin Kenneally, Tyler Moore, Erin Kenneally, Tyler Moore & Erin Kenneally

internet_address_survey_icmp1-20030601 (06/01/2003 to 09/25/2003)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged at most 5 times by sending ICMP ECHO_REQUEST (PING) packet, before giving up. If the response (ICMP ECHO_REPLY) came, its IP address was recorded in this data-set. In all, approximately 2.5 billion distinct IP addresses were probed during this experiment.

ATG 10001/TCP SYN Scans

External Data Source
The datasets here include the list of IP addresses that responded to our TCP SYN scans against port 10001 in a manner that indicates that the port is open. ; research@rapid7.com

The hasselt/EDM dataset

External Data Source
A complete collection of all management and control frames (including Radiotap headers) observed at our research lab from 28 January to 8 Febuary 2016. This dataset was used to calculate the "stability" and "variability" of Probe Request IEs (see our paper for more details on these metrics). ; pieter.robyns@uhasselt.be

Network Atlas

External Data Source
Network Atlas is a crowd-sourced near real-time map of the global Internet infrastructure detailing the world's submarine and terrestrial networks in real time. Users can add networks to the map, update listings with more accurate information and use the atlas' near real-time data to track outages and identify possible areas of expansion. Network Atlas is a non-for-profit services designed to help provide a more accurate accounting of the world's network grid. ;

Alexa Top 1 Million Download and Lookups

External Data Source
no description

internet_address_census_it61c-20140829 (08/29/2014 to 10/01/2014)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_survey_reprobing_it37c-20101209 (12/09/2010 to 12/23/2010)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 22373 netblocks (/24 subnets) were periodically reprobed.

internet_address_census_it77j-20170830 (08/30/2017 to 09/25/2017)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_survey_reprobing_it32w-20100329 (03/29/2010 to 04/12/2010)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 22377 netblocks (/24 subnets) were periodically reprobed.

pafish

External Data Source
The objective of this project is to collect usual tricks seen in malware samples. This allows us to study them, and test if our analysis environments are properly implemented.

nemesis

External Data Source
The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts. Key Features ARP/RARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP protocol support Layer 2 or Layer 3 injection on UNIX-like systems Layer 2 injection (only) on Windows systems Packet payload from file...

libtins

External Data Source
libtins main purpose is to provide the C++ developer an easy, efficient, platform and endianness-independent way to create tools which need to send, receive and manipulate network packets. libtins supports several protocols and features: Network packet crafting. Packet sniffing and automatic packet interpretation. Reading and writing PCAP files. Following and reassembling TCP streams on the fly. Decrypting WEP and WPA2(TKIP and CCMP) encrypted 802.11 data frames on the fly and interpreting the decrypted content. Works...

al-khaser

External Data Source
al-khaser is a PoC malware application with good intentions that aims to stress your anti-malware system. It performs a bunch of common malware tricks with the goal of seeing if you stay under the radar.

polymorph

External Data Source
Polymorph is a framework written in Python 3 that allows the modification of network packets in real time, providing maximum control to the user over the contents of the packet. This framework is intended to provide an effective solution for real-time modification of network packets that implement practically any existing protocol, including private protocols that do not have a public specification. In addition to this, one of its main objectives is to provide the user...

kamene

External Data Source
Scapy is a Python program that enables the user to send, sniff and dissect and forge network packets. This capability allows construction of tools that can probe, scan or attack networks. In other words, Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. Scapy can easily handle most...

botnets

External Data Source
This is a collection of botnet source codes, unorganized. Many projects are duplicates or revisions of each other. Many of them have outdated depedencies. The goal is to collectively put them together so that they are compilable and help people interested in malware research analyze them and learn from these samples.

libcrafter

External Data Source
Libcrafter is a high level library for C++ designed to create and decode network packets. It is able to craft or decode packets of most common networks protocols, send them on the wire, capture them and match requests and replies. It enables the creation of networking tools in a few lines with a interface very similar to Scapy. A packet is described as layers that you stack one upon the other. Fields of each layer...

ufonet

External Data Source
UFONet is a tool designed to launch Layer 7 (HTTP/Web Abuse) DDoS attacks, using Open Redirect vectors, generally located on third party web applications (a botnet) and other powerful DoS attacks, some including different OSI model layers, as for example the TCP/SYN flood attack, which is perform on Layer 3 (Network).

wifiphisher

External Data Source
Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares. Wifiphisher is... ...powerful. Wifiphisher can run for hours inside a Raspberry Pi device executing all modern Wi-Fi association techniques (including Evil Twin , KARMA and Known Beacons ). ...flexible. Supports dozens of arguments and comes with a set...

internet_outage_adaptive_a29all-20170702 (07/02/2017 to 10/06/2017)

University Of Southern California-Information Sciences Institute
Combined reachability information for over 3.5M /24 subnets; this dataset is created by post-processing data from datasets internet_outage_adaptive_a29c-20170702 internet_outage_adaptive_a29e-20170702 internet_outage_adaptive_a29g-20170702 internet_outage_adaptive_a29j-20170702

internet_address_census_it76g-20170628 (06/28/2017 to 08/02/2017)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

Registration Year

  • 2017
    791
  • 2018
    319
  • 2019
    104

Resource Types

  • Dataset
    1,214