*.pcap

In this dataset, we provide detailed traffic stream data for the Spot robot, including both the Spot robot control traffic stream and the Spot video stream. The Spot robot traffic streams provide realistic traffic data for communication network evaluations, e.g., for measurements with the TSN FlexText testbed. Furthermore, we share data for the tactile internet including audio, video, and robotic communication. Finally, the dataset includes generic data streams for three different intervals (0.2ms, 0.3ms, and 0.5ms) with two different Ethernet frame sizes.
- Categories:

Maximum capture length for interface 0: 65000
First timestamp: 1186262976.484933000
Last timestamp: 1186263276.484931000
Unknown encapsulation: 0
IPv4 bytes: 2768247216
IPv4 pkts: 45954067
IPv4 flows: 2860519
Unique IPv4 addresses: 7075
Unique IPv4 source addresses: 7065
- Categories:
This dataset provides wireless measurements from two industrial testbeds: iV2V (industrial Vehicle-to-Vehicle) and iV2I+ (industrial Vehicular-to-Infrastructure plus sensor).
iV2V covers 10h of sidelink communication scenarios between 3 Automated Guided Vehicles (AGVs), while iV2I+ was conducted for around 16h at an industrial site where an autonomous cleaning robot is connected to a private cellular network.
- Categories:
Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.
- Categories:
The dataset is generated by performing different Man-in-the-Middle (MiTM) attacks in the synthetic cyber-physical electric grid in RESLab Testbed at Texas AM University, US. The testbed consists of a real-time power system simulator (Powerworld Dynamic Studio), network emulator (CORE), Snort IDS, open DNP3 master, SEL real-time automation controller (RTAC), and Cisco Layer-3 switch. With different scenarios of MiTM attack, we implement a logic-based defense mechanism in RTAC and save the traffic data and related cyber alert data under the attack.
- Categories:

The dataset is oriented on encrypted traffic classification problems. The dataset contains three classes of flows: web flows, YouTube flows, and Netflixflows. These classes are chosen because web and video traffic account for 90% of global traffic, while YouTube and Netflix are the largest video services. The structure of the dataset is as follows. It includes 100 download traces of the most popular web pages according to https://httparchive.org, 100 the most popular YouTube videos, and 50 Netflix series and movies.
- Categories:
This data set contains packet captures (PCAPs) of a 5G campus network.
The corresponding paper can be found at 5G Campus Networks: A First Measurement Study
Acknowledgement:
- Categories:
Datasets as described in the research paper "Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Applications".
There are two main dataset provided here, firstly is the data relating to the initial training of the machine learning module for both normal and malicious traffic, these are in binary visulisation format, compresed into the document traffic-dataset.zip.
- Categories: