10.5281/zenodo.4039679
https://zenodo.org/records/4039679
oai:zenodo.org:4039679
Hynek, Karel
Karel
Hynek
0000-0002-8281-618X
CESNET z.s.p.o.
Cejka, Tomas
Tomas
Cejka
0000-0001-7794-9511
CESNET z.s.p.o.
Dataset used for fingerprinting of DNS over HTTPS responses.
Zenodo
2020
DNS
HTTPS
DoH
Chrome
Firefox
Fingerpirinting
2020-09-20
eng
10.5281/zenodo.4039587
Creative Commons Attribution 4.0 International
The dataset consists of multiple different data sources:
DoH enabled Firefox on Linux OS
DoH enabled Firefox on Windows 10 OS
DoH enabled Chrome on Windows 10 OS
We captured the traffic from the DoH enabled web-browsers using tcpdump. To automate the process of traffic generation, we installed Google Chrome and Mozilla Firefox into separate virtual machines and controlled them with the Selenium framework shows detailed information about used browsers and environments). Selenium simulates a user's browsing according to the predefined script and a list of domain names (i.e., URLs from Alexa's top websites list in our case). The selenium was configured to visit pages in random order multiple times. For capturing the traffic, we used the default settings of each browser. We did not disable the DNS cache of the browser, and the random order of visiting webpages secures that the dataset contains traces influenced by DNS caching mechanisms. Each virtual machine was configured to export TLS cryptographic keys, that was used for decrypting the traffic using WireShark application.
The WireShark text output of the decrypted traffic is provided in the dataset files. The detailed information about each file is provided in dataset README.
European Commission
10.13039/501100000780
833418
Sharing and Automation for Privacy Preserving Attack Neutralization