HTTPS Brute-force dataset with extended network flows
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F63839172%3A_____%2F21%3A10133393" target="_blank" >RIV/63839172:_____/21:10133393 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.5281/zenodo.4275775" target="_blank" >http://dx.doi.org/10.5281/zenodo.4275775</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.5281/zenodo.4275775" target="_blank" >10.5281/zenodo.4275775</a>
Alternative languages
Result language
angličtina
Original language name
HTTPS Brute-force dataset with extended network flows
Original language description
We are publishing a dataset we created for designing a brute-force detector of attacks in HTTPS. The dataset consists of extended network flows that we captured with flow exporter Ipifixprobe. Apart from traditional fields like source and destination IP addresses and ports, each flow contains information (size, direction, inter-packet time, TCP flags) about up to the first 100 packets. The sizes of packets are taken from the transport layer (TCP, UPD); packets with zero payload (e.g., TCP ACKs) are ignored.
Czech name
—
Czech description
—
Classification
Type
O - Miscellaneous
CEP classification
—
OECD FORD branch
20202 - Communication engineering and systems
Result continuities
Project
—
Continuities
R - Projekt Ramcoveho programu EK
Others
Publication year
2021
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů