Dataset Open Access
Jan Luxemburk;
Karel Hynek;
Tomas Cejka
We are publishing a dataset we created for designing a brute-force detector of attacks in HTTPS. The dataset consists of extended network flows that we captured with flow exporter Ipifixprobe. Apart from traditional fields like source and destination IP addresses and ports, each flow contains information (size, direction, inter-packet time, TCP flags) about up to the first 100 packets. The sizes of packets are taken from the transport layer (TCP, UPD); packets with zero payload (e.g., TCP ACKs) are ignored.
We publish three files:
All IP addresses, source ports, TLS SNIs are sha256-hashed. Column CLASS is 0 for benign samples and 1 for brute-force samples.
Brute-force data
The brute-force data were generated with three popular attack tools - Ncrack, Thc-hydra, and Patator. Attacks were performed against these applications:
The SCENARIO columns indicate which tool and application were used to generate the sample.
Benign data
Bening data consists of eight captures from a backbone network. The SCENARIO column indicates individual captures.
Name | Size | |
---|---|---|
brute-force-dataset.zip
md5:37467d0fddf27eeeeae1388800f0d4d8 |
209.1 MB | Download |
All versions | This version | |
---|---|---|
Views | 346 | 346 |
Downloads | 89 | 89 |
Data volume | 18.6 GB | 18.6 GB |
Unique views | 290 | 290 |
Unique downloads | 70 | 70 |