Published February 3, 2022 | Version v1
Dataset Open

DoH-Gen-C-CFGHOQS

  • 1. FIT BUT
  • 2. FIT CTU
  • 3. CESNET z.s.p.o

Description

NOTICE: The data file 1_chrome_ffmuc.pcap is corrupted and is not used in our articles that work with this dataset.

Dataset of DNS over HTTPS traffic from Chrome (CloudFlare, FFMuc, Google, Hostux, OpenDNS, Quad9, Switch)

The dataset contains DoH and HTTPS traffic that was captured in controlled environment and generated automatically by Chrome browser with enabled DoH towards 7 different DoH servers (CloudFlare, FFMuc, Google, Hostux, OpenDNS, Quad9, Switch) and a web page loads towards a sample of web pages taken from Majestic Million dataset. The data are provided in the form of PCAP files. However, we also provided TLS enriched flow data that are generated with opensource ipfixprobe flow exporter. Other than TLS related information is not relevant since the dataset comprises only encrypted TLS traffic. The TLS enriched flow data are provided in the form of CSV files with the following columns:

Column Name Column Description
DST_IP Destination IP address
SRC_IP Source IP address
BYTES The number of transmitted bytes from Source to Destination
BYTES_REV The number of transmitted bytes from Destination to Source
TIME_FIRST Timestamp of the first packet in the flow in format YYYY-MM-DDTHH-MM-SS
TIME_LAST Timestamp of the last packet in the flow in format YYYY-MM-DDTHH-MM-SS
PACKETS The number of packets transmitted from Source to Destination
PACKETS_REV The number of packets transmitted from Destination to Source
DST_PORT Destination port
SRC_PORT Source port
PROTOCOL The number of transport protocol
TCP_FLAGS Logic OR across all TCP flags in the packets transmitted from Source to Destination
TCP_FLAGS_REV Logic OR across all TCP flags in the packets transmitted from Destination to Source
TLS_ALPN The Value of Application Protocol Negotiation Extension sent from Server
TLS_JA3 The JA3 fingerprint
TLS_SNI The value of Server Name Indication Extension sent by Client

The DoH resolvers in the dataset can be identified by IP addresses written in doh_resolver_ip.csv file.

The main part of the dataset is located in DoH-Gen-C-CFGHOQS.tar.gz and has the following structure:

.
└─── data                   | - Main directory with data
     └── generated          | - Directory with generated captures
         ├── pcap           | - Generated PCAPs
         │   └── chrome
         └── tls-flow-csv   | - Generated CSV flow data
             └── chrome
 

Total stats of generated data:

Name Value
Total Data Size 41.5 GB
Total files 14
DoH extracted tls flows ~41 K
Non-DoH extracted tls flows ~284 K

 

DoH Server information

 

Name Provider DoH query url
CloudFlare https://www.cloudflare.com https://cloudflare-dns.com/dns-query
FFMuc https://ffmuc.net https://doh.ffmuc.net/dns-query
Google https://google.com https://dns.google/dns-query
Hostux https://dns.hostux.net/en/ https://dns.hostux.net/dns-query
OpenDNS https://www.opendns.com https://doh.opendns.com/dns-query
Quad9 https://www.quad9.net https://dns.quad9.net/dns-query
Switch https://www.switch.ch https://dns.switch.ch/dns-query

 

Notes

This research was funded by the Ministry of Interior of the Czech Republic, grant No. VJ02010024: Flow-Based Encrypted Traffic Analysis and also by the Grant Agency of the CTU in Prague, grant No. SGS20/210/OHK3/3T/18 funded by the MEYS of the Czech Republic, and also by Brno University of Technology, Faculty of Information Technology internal grant FIT-S-20-6293, and also by Technology Agency of the Czech Republic, grant No. FW03010099: Context-based Encrypted Traffic Analysis Using Flow Data

Files

doh_resolver_ip.csv

Files (40.6 GB)

Name Size Download all
md5:3d322dac0498b5f5e4da5821e764dd41
40.6 GB Download
md5:25c9ebc13fe579f4885590702d7ab545
4.2 kB Preview Download