We present a dataset that captures seven days of monitoring data from eight servers hosting more than 800 sites across a large campus network. The dataset contains data from network monitoring and host-based monitoring. The first set of data are packet traces collected by a probe situated on the network link in front of the web servers. The traces contain encrypted HTTP over TLS 1.2 communication between clients and web servers. The second set of data is an event log captured directly on the web servers. The events are generated by the Internet Information Services (IIS) logging and include both the IIS default features and custom features, such as client port and transferred data volume. Anonymization of all features in the dataset has bee...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Analysis of network traffic allows us to explore events in the monitored network (even retrospective...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
The widespread adoption of encryption in computer network traffic is increasing the difficulty of an...
The dataset consists of data from three different sources; flow records collected from the universit...
The widespread adoption of encryption in computer network traffic is increasing the difficulty of an...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Even though network traffic is typically encrypted, and it is almost impossible to look into the con...
Network packets are busy exchanging information like data from human activities, machine (M2M commun...
We are publishing a dataset we created for the HTTPS traffic classification. Since the data were ca...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Analysis of network traffic allows us to explore events in the monitored network (even retrospective...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
The widespread adoption of encryption in computer network traffic is increasing the difficulty of an...
The dataset consists of data from three different sources; flow records collected from the universit...
The widespread adoption of encryption in computer network traffic is increasing the difficulty of an...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Encryption of network traffic should guarantee anonymity and prevent potential interception of infor...
Even though network traffic is typically encrypted, and it is almost impossible to look into the con...
Network packets are busy exchanging information like data from human activities, machine (M2M commun...
We are publishing a dataset we created for the HTTPS traffic classification. Since the data were ca...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Many approaches have been proposed so far to tackle computer network security. Among them, several s...
Analysis of network traffic allows us to explore events in the monitored network (even retrospective...