HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods

HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods

Citation Author(s):
Young-Hoon
Goo
Korea University
Kyu-Seok
Shim
Korea University
Min-Seob
Lee
Korea University
Myung-Sup
Kim
Korea University
Submitted by:
Young-Hoon Goo
Last updated:
Mon, 03/04/2019 - 13:54
DOI:
10.21227/tpqf-fe98
Data Format:
License:
Dataset Views:
289
Rating:
0
0 ratings - Please login to submit your rating.
Share / Embed Cite

CATEGORIES

KEYWORDS

Abstract: 

HTTP and DNS sample traffic traces for experimenting of protocol reverse engineering methods.

Instructions: 

This dataset is a set of network traffic traces of the HTTP and DNS protocols. This traffic traces were collected from multiple hosts over various time periods.

This dataset can be used to test the protocol reverse engineering methodology.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Login or subscribe now. Sign up to be a Beta Tester and receive a coupon code for a free subscription to IEEE DataPort!

Thank you for rating this dataset!

Please share additional details of your rating with the IEEE DataPort community by adding a comment.

Embed this dataset on another website

Copy and paste the HTML code below to embed your dataset:

Share via email or social media

Click the buttons below:

facebooktwittermailshare
[1] Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim, "HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/tpqf-fe98. Accessed: Mar. 31, 2020.
@data{tpqf-fe98-19,
doi = {10.21227/tpqf-fe98},
url = {http://dx.doi.org/10.21227/tpqf-fe98},
author = {Young-Hoon Goo; Kyu-Seok Shim; Min-Seob Lee; Myung-Sup Kim },
publisher = {IEEE Dataport},
title = {HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods},
year = {2019} }
TY - DATA
T1 - HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods
AU - Young-Hoon Goo; Kyu-Seok Shim; Min-Seob Lee; Myung-Sup Kim
PY - 2019
PB - IEEE Dataport
UR - 10.21227/tpqf-fe98
ER -
Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim. (2019). HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods. IEEE Dataport. http://dx.doi.org/10.21227/tpqf-fe98
Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim, 2019. HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods. Available at: http://dx.doi.org/10.21227/tpqf-fe98.
Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim. (2019). "HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods." Web.
1. Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim. HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods [Internet]. IEEE Dataport; 2019. Available from : http://dx.doi.org/10.21227/tpqf-fe98
Young-Hoon Goo, Kyu-Seok Shim, Min-Seob Lee, Myung-Sup Kim. "HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods." doi: 10.21227/tpqf-fe98