Published February 3, 2022 | Version v1
Dataset Open

DoH-Gen-C-DDD

  • 1. FIT BUT
  • 2. FIT CTU
  • 3. CESNET z.s.p.o

Description

NOTICE: The data file 0_chrome_dohli.pcap is corrupted and is not used in our articles that work with this dataset.

Dataset of DNS over HTTPS traffic from Chrome Browser (DNSForge, DSNSB, DOHli)

The dataset contains DoH and HTTPS traffic that was captured in controlled environment and generated automatically by Chrome browser with enabled DoH towards 3 different DoH servers (DNSForge, DSNSB, DOHli) and a web page loads towards a sample of web pages taken from Majestic Million dataset. The data are provided in the form of PCAP files. However, we also provided TLS enriched flow data that are generated with opensource ipfixprobe flow exporter. Other than TLS related information is not relevant since the dataset comprises only encrypted TLS traffic. The TLS enriched flow data are provided in the form of CSV files with the following columns:

Column Name Column Description
DST_IP Destination IP address
SRC_IP Source IP address
BYTES The number of transmitted bytes from Source to Destination
BYTES_REV The number of transmitted bytes from Destination to Source
TIME_FIRST Timestamp of the first packet in the flow in format YYYY-MM-DDTHH-MM-SS
TIME_LAST Timestamp of the last packet in the flow in format YYYY-MM-DDTHH-MM-SS
PACKETS The number of packets transmitted from Source to Destination
PACKETS_REV The number of packets transmitted from Destination to Source
DST_PORT Destination port
SRC_PORT Source port
PROTOCOL The number of transport protocol
TCP_FLAGS Logic OR across all TCP flags in the packets transmitted from Source to Destination
TCP_FLAGS_REV Logic OR across all TCP flags in the packets transmitted from Destination to Source
TLS_ALPN The Value of Application Protocol Negotiation Extension sent from Server
TLS_JA3 The JA3 fingerprint
TLS_SNI The value of Server Name Indication Extension sent by Client

The DoH resolvers in the dataset can be identified by IP addresses written in doh_resolver_ip.csv file.

The main part of the dataset is located in DoH-Gen-C-DDD.tar.gz and has the following structure:

.
└─── data                   | - Main directory with data
     └── generated          | - Directory with generated captures
         ├── pcap           | - Generated PCAPs
         │   └── chrome
         └── tls-flow-csv   | - Generated CSV flow data
             └── chrome

Total stats of generated data:

Name Value
Total Data Size 34.5 GB
Total files 6
DoH extracted tls flows ~15 K
Non-DoH extracted tls flows ~103 K

 

DoH Server information

 

Name Provider DoH query url
DNSForge https://dnsforge.de https://dnsforge.de/dns-query
DNSSB https://dns.sb/doh/ https://doh.dns.sb/dns-query
DOHli https://doh.li https://doh.li/dns-query

 

 

 

Notes

This research was funded by the Ministry of Interior of the Czech Republic, grant No. VJ02010024: Flow-Based Encrypted Traffic Analysis and also by the Grant Agency of the CTU in Prague, grant No. SGS20/210/OHK3/3T/18 funded by the MEYS of the Czech Republic, and also by Brno University of Technology, Faculty of Information Technology internal grant FIT-S-20-6293, and also by Technology Agency of the Czech Republic, grant No. FW03010099: Context-based Encrypted Traffic Analysis Using Flow Data.

Files

doh_resolver_ip.csv

Files (37.0 GB)

Name Size Download all
md5:1661cd3ea4c9b675b128edb4c22be80a
37.0 GB Download
md5:25c9ebc13fe579f4885590702d7ab545
4.2 kB Preview Download