The dataset consists of data from three different sources; flow records collected from the university backbone network, log entries from the two university DHCP (Dynamic Host Configuration Protocol) servers and a single RADIUS (Remote Authentication Dial In User Service) accounting server. The data was collected from 2019-07-12 00:00 to 2019-07-16 23:59 with a few hours overhead on both sides of the interval for the log entries to cover long connection sessions overlapping to and from the time frame. We measured the flow data from the university uplink to the Internet. In the dataset, we kept only flows with source IP addresses from university wireless networks (Eduroam). The flow data was then enriched with information from DHCP and RADIU...
The dataset consists of multiple different data sources: DoH enabled Firefox on Linux OS DoH ena...
We present a new method for detecting known data in certain TLS encrypted communication channels. Ou...
The growing share of encrypted network traffic complicates network traffic analysis and network fore...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Asset identification plays a vital role in situational awareness building. However, the current tren...
For the evaluation of OS fingerprinting methods, we need a dataset with the following requirements: ...
Active measurements can be used to collect server characteristics on a large scale. This kind of met...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Active measurements can be used to collect server characteristics on a large scale. This kind of met...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
Please refer to the original data article for further data description: Jeřábek & Hynek et al., Coll...
Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. R...
While the Internet is moving towards more and more encryption of the network traffic, it is also a t...
The dataset consists of multiple different data sources: DoH enabled Firefox on Linux OS DoH ena...
We present a new method for detecting known data in certain TLS encrypted communication channels. Ou...
The growing share of encrypted network traffic complicates network traffic analysis and network fore...
Asset identification plays a vital role in situational awareness building. However, the current tren...
Asset identification plays a vital role in situational awareness building. However, the current tren...
For the evaluation of OS fingerprinting methods, we need a dataset with the following requirements: ...
Active measurements can be used to collect server characteristics on a large scale. This kind of met...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Active measurements can be used to collect server characteristics on a large scale. This kind of met...
We present a dataset that captures seven days of monitoring data from eight servers hosting more tha...
Network forensics is increasingly hampered by the ubiquitous use of encrypted channels by legitimate...
Operating system fingerprinting methods are well-known in the domain of static networks and managed ...
Please refer to the original data article for further data description: Jeřábek & Hynek et al., Coll...
Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. R...
While the Internet is moving towards more and more encryption of the network traffic, it is also a t...
The dataset consists of multiple different data sources: DoH enabled Firefox on Linux OS DoH ena...
We present a new method for detecting known data in certain TLS encrypted communication channels. Ou...
The growing share of encrypted network traffic complicates network traffic analysis and network fore...