We are publishing a dataset we created for designing a brute-force detector of attacks in HTTPS. The dataset consists of extended network flows that we captured with flow exporter Ipifixprobe. Apart from traditional fields like source and destination IP addresses and ports, each flow contains information (size, direction, inter-packet time, TCP flags) about up to the first 100 packets. The sizes of packets are taken from the transport layer (TCP, UPD); packets with zero payload (e.g., TCP ACKs) are ignored. We publish three files: flows.csv, which contains raw flow data. aggregated_flows.csv, which contains aggregated flows samples.csv, which contains samples with extracted features. This data can be used for training a machine-learni...
The Internet has become an indispensable component of our daily social and financial lives. Nonethel...
Detection of network attacks is the first step to network security. Many different methods for attac...
Brute-force attacks against Web site are a common area of concern, both for Web site owners and host...
Tato práce představuje přehled metod pro detekci síťových hrozeb se zaměřením na útoky hrubou silou ...
In the early days of network and service management, researchers paid much attention to the design o...
In the early days of network and service management, researchers paid much attention to the design o...
In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses networ...
We are publishing a dataset we created for the HTTPS traffic classification. Since the data were ca...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a net...
Each year the world's dependency on the internet grows, especially its functionality relating to cri...
The Internet has become an indispensable component of our daily social and financial lives. Nonethel...
Detection of network attacks is the first step to network security. Many different methods for attac...
Brute-force attacks against Web site are a common area of concern, both for Web site owners and host...
Tato práce představuje přehled metod pro detekci síťových hrozeb se zaměřením na útoky hrubou silou ...
In the early days of network and service management, researchers paid much attention to the design o...
In the early days of network and service management, researchers paid much attention to the design o...
In this paper, we present an analysis of HTTP traffic in a large-scale environment which uses networ...
We are publishing a dataset we created for the HTTPS traffic classification. Since the data were ca...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Many types of brute-force attacks are known to exhibit a characteristic ‘flat’ behavior at the netwo...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accou...
Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a net...
Each year the world's dependency on the internet grows, especially its functionality relating to cri...
The Internet has become an indispensable component of our daily social and financial lives. Nonethel...
Detection of network attacks is the first step to network security. Many different methods for attac...
Brute-force attacks against Web site are a common area of concern, both for Web site owners and host...