Published April 30, 2022 | Version 1
Dataset Open

DNS Threats Dataset

  • 1. LABSIN, Facultad de Ingeniería, UNCuyo, Mendoza, Argentina
  • 2. Carlos
  • 3. Jorge
  • 4. Sebastian
  • 5. Maria

Description

The dataset contains Normal, DGA and Tunneling domain names: i. the total number of normal domains are conformed by the Alexa top one million domains, 3,161 normal domains provided by the Bambenek Consulting feed, and another 177,017 normal domains; ii. the DGA domains were obtained from the repositories of DGA domains of Andrey Abakumov and John Bambenek, corresponding to 51 different malware families; iii. the DNS Tunneling consist of 8000 tunnel domains generated using a set of well known DNS tunneling tools under laboratory conditions: iodine, dnscat2 and dnsExfiltrator.

The dataset is described in the paper:
Palau, F., Catania, C., Guerra, J., García, S. J., & Rigaki, M. (2019). Detecting DNS threats: A deep learning model to rule them all. In XX Simposio Argentino de Inteligencia Artificial (ASAI 2019)-JAIIO 48 (Salta).

Notes

The paper where the dataset is discussed can be found at http://sedici.unlp.edu.ar/handle/10915/87859

Files

Files (29.4 MB)

Name Size Download all
md5:ce52df239c4245ffaa15c642b8b0b625
6.3 MB Download
md5:c30a49c6f362e0c2dffe3881504a6825
23.0 MB Download