*.pcap

In this dataset, we provide detailed traffic stream data for the Spot robot, including both the Spot robot control traffic stream and the Spot video stream. The Spot robot traffic streams provide realistic traffic data for communication network evaluations, e.g., for measurements with the TSN FlexText testbed. Furthermore, we share data for the tactile internet including audio, video, and robotic communication. Finally, the dataset includes generic data streams for three different intervals (0.2ms, 0.3ms, and 0.5ms) with two different Ethernet frame sizes.

Categories:
489 Views

Maximum capture length for interface 0:            65000

First timestamp:                     1186262976.484933000

Last timestamp:                      1186263276.484931000

Unknown encapsulation:                                  0

IPv4 bytes:                                    2768247216

IPv4 pkts:                                       45954067

IPv4 flows:                                       2860519

Unique IPv4 addresses:                               7075

Unique IPv4 source addresses:                        7065

Categories:
1551 Views

This dataset provides wireless measurements from two industrial testbeds: iV2V (industrial Vehicle-to-Vehicle) and iV2I+ (industrial Vehicular-to-Infrastructure plus sensor).

iV2V covers 10h of sidelink communication scenarios between 3 Automated Guided Vehicles (AGVs), while iV2I+ was conducted for around 16h at an industrial site where an autonomous cleaning robot is connected to a private cellular network.

Categories:
2693 Views

Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Categories:
1084 Views

The dataset is generated by performing different Man-in-the-Middle (MiTM) attacks in the synthetic cyber-physical electric grid in RESLab Testbed at Texas AM University, US. The testbed consists of a real-time power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master, SEL real-time automation controller (RTAC), and Cisco Layer-3 switch. With different scenarios of MiTM attack, we implement a logic-based defense mechanism in RTAC and save the traffic data and related cyber alert data under the attack.

Categories:
1555 Views

The dataset is oriented on encrypted traffic classification problems. The dataset contains three classes of flows: web flows, YouTube flows, and Netflixflows. These classes are chosen because web and video traffic account for 90% of global traffic, while YouTube and Netflix are the largest video services. The structure of the dataset is as follows. It includes 100 download traces of the most popular web pages according to https://httparchive.org, 100 the most popular YouTube videos, and 50 Netflix series and movies.

Categories:
1985 Views

This data set contains packet captures (PCAPs) of a 5G campus network.

The corresponding paper can be found at 5G Campus Networks: A First Measurement Study

Acknowledgement:

Categories:
3504 Views

Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".

There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.

Categories:
6106 Views

Pages