276 Works

WarChild

External Data Source
Warchild is a denial of service testing suite made for analysing the strength of your websiteagainst different kinds of denial of service attacks you will be facing which are mainly organised by crooks to cause damage to your website. Overview This Denial Of Service suite comprises of the following features : CloudBust :- Cloudbust a.k.a AETHON is a cloudflare resolver that looks into the cloudflare protectedwebsite for misconfigured DNS configurationbasically uses dnsdumpster.com as its resolver...

CAIDA UCSD Network Telescope Daily Randomly and Uniformly Spoofed Denial-of-Service (RSDoS) Attack Metadata (2008-10-01 to 2019-06-24)

UCSD-Center For Applied Internet Data Analysis
This dataset is aggregated from the unidirectional unsolicited IPv4 traffic reaching the UCSD Network Telescope. From the raw traffic data, we extract the backscatter (response) packets sent by victims of randomly and uniformly spoofed DoS attacks, summarize activity that relates to the same victim in an 'attack vector', and produce a single CSV file of attack vectors per day. The attack vector consists of a target IP address, statistical information about the attack, and geolocation...

IoT_Bootup_Traces-20181107 (2018-11-07 to 2018-11-09)

University Of Southern California-Information Sciences Institute
First-time boot-up traffic of multiple IoT devices located in a LAN network. Traces are captured at LAN port of the LAN router.

Auto-labeled Corpus

External Data Source
This corpus was generated and first used in the following paper, which provides many additional details. Bridges, Robert A., et al. "Automatic Labeling for Entity Extraction in Cyber Security.” accepted The Third ASE International Conference on Cyber Security 2014. Preprint arXiv preprint arXiv:1308.4941 (2013). The src/python/tagging directory contains scripts to generate and tag the initial corpus, using various heuristics. The src/python/learning directory contains scripts to generate a model from the tagged corpus, and then evaluate...

CyberVAN

External Data Source
CyberVAN provides the highest fidelity representation of a network next to actually deploying the real network, by representing the network in a discrete event network simulator, and enabling hosts represented by virtual machines (VMs) to communicate over this simulated network. CyberVAN provides the highest fidelity representation of a network next to actually deploying the real network, by representing the network in a discrete event network simulator, and enabling hosts represented by virtual machines (VMs) to...

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

External Data Source
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob’s name to a public key, and if a remote entity can prove knowledge of Bob’s private key, then (barring key compromise) that remote entity must be Bob. However, in reality, many websites—and the majority of the most popular ones—are hosted at least in part by third parties such as Content Delivery Networks (CDNs) or web hosting providers....

FuzzSim: Black-box Fuzzing Simulator

External Data Source
Black-box mutational fuzzing is an effective, albeit simple, way to find bugs in software. Given a set of fuzzing configurations, which can be thought of as pairs of programs and seeds, FuzzSim evaluates various methods for scheduling the fuzzing of these pairs. The key feature of the system is that comprehensive data on fuzzing all pairs is obtained in advance, so that any scheduling algorithm's performance can be observed without duplication of fuzzing effort. Thus,...

Understanding and Monitoring Embedded Web Scripts

External Data Source
ScriptInspector assists site administrators in understanding, monitoring, and restricting the behavior of third-party scripts embedded in their site. ScriptInspector is a modified browser that can intercept, record, and check third-party script accesses to critical resources against security policies. ;

internet_address_census_it87c-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87n-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_survey_reprobing_it87c-20191014 (2019-10-14 to 2019-10-28)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40490 netblocks (/24 subnets) were periodically reprobed.

internet_address_survey_reprobing_it87w-20190911 (2019-09-11 to 2019-09-25)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40490 netblocks (/24 subnets) were periodically reprobed.

internet_address_census_it87w-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87g-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87e-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it87j-20190911 (2019-09-11 to 2019-10-13)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_hitlist_it87w-20190911 (2016-10-03 to 2019-10-13)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2019-10-28, based on census data from it72w to it87w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it72w - it87w.

internet_address_history_it87w-20190911 (2016-10-03 to 2019-10-13)

University Of Southern California-Information Sciences Institute
This dataset, generated on 2019-10-28, contains all IPv4 addresses who ever responded to our ISI-west (w) censuses, starting from census it11w (internet_address_survey_it11w-20060307), e.g. it11w, it12w, ... Each IP address is given a history of replies (as a bit-string with 's representing ICMP_ECHO_REPLY received from this IP, and 's corresponding to no-replies. We also include numerical scores that are intended to reflect the likelihood that the given IP address will repond in the future. The scores...

Internet Infrastructure Risk Economics Research Issue Brief

David Balenson, Erin Kenneallly, Erin Kenneallly, Ashley Begley, David Balenson, Christina Davis, Christina Davis, Christina Davis, Erin Kenneallly, Lucien Randazzese, Ashley Begley, Lucien Randazzese, Lucien Randazzese, Ashley Begley, Christina Davis, David Balenson, Ashley Begley, David Balenson, Lucien Randazzese, Christina Davis, Erin Kenneallly, Lucien Randazzese, David Balenson, Erin Kenneallly & Ashley Begley

NCCDC_logs_zeek-20170413 (2017-04-13 to 2017-04-15)

University Of Southern California-Information Sciences Institute
This dataset is Zeek output from packet captures from the 2017 National Collegiate Cyber Defense Competition (nccdc.org). CCDC is a multi-day competition that specifically focuses on the operational aspects of managing and protecting an existing commercia" network infrastructure. Teams of undergraduate/graduate students are provided with a fully functional (but insecure) small business network they must secure; maintain; and defend against a live Red Team. Teams must also respond to business tasks called"inject" throughout the competition....

Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report.

Dave Dittrich, Dave Dittrich, Erin Kenneally & Erin Kenneally

Nmap

External Data Source
Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It...

Xplico

External Data Source
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). Features - Protocols supported: HTTP, SIP, IMAP, POP, SMTP, TCP, UDP, IPv6, …; - Port Independent Protocol...

openssl

External Data Source
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Transport Layer Security (TLS) protocols (including SSLv3) as well as a full-strength general purpose cryptographic library. The OpenSSL toolkit includes: libssl (with platform specific naming): Provides the client and server-side implementations for SSLv3 and TLS. libcrypto (with platform specific naming): Provides general cryptographic and X.509 support needed by SSL/TLS but not logically part of it....

Wireshark

External Data Source
Wireshark lets you see what’s happening on your network at a microscopic level and is the standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark has a rich feature set which includes the following: - Deep inspection of hundreds of protocols, with more being added all the time - Live capture and offline analysis - Standard three-pane packet browser - Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many...

Registration Year

  • 2019
    276

Resource Types

  • Dataset
    276