• Anon17: Network Traffic Dataset of Anonymity Services:
For Anonymity Networks data please refer to this.
• Botnet Traffic Classification:
For Botnet traffic data please refer to this.
• Encrypted Traffic Classification:
NetMate is employed to generate flows and compute feature values on the above data sets. Data sets are available for researchers in ARFF/CSV format that is ready to be used with Weka. The data sets are labeled. If you would like to use the data, please cite these papers:
•Alshammari, R.; Zincir-Heywood, A.N., "Can Encrypted Traffic be identified without Port Numbers, IP Addresses and Payload Inspection?", Journal of Computer Networks, Elsevier, 2011.
•Alshammari, Riyad; Zincir-Heywood, A. Nur, "Investigating Two Different Approaches for Encrypted Traffic Classification", PST '08. Sixth Annual Conference on Privacy, Security and Trust, 2008, vol., no., pp.156-166, 1-3 Oct. 2008.
•Alshammari, R.; Zincir-Heywood, A.N., "A flow based approach for SSH traffic detection," Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on , vol., no., pp. 296-301, 7-10 Oct. 2007.
Download Data sets:
•NIMS1 data set
•DARPA 1999 Week1 data set
•DARPA 1999 Week3 data set
•MAWI data set
•NLANR (AMP) data set
If you would like to use the NIMS2 data, please cite these papers:
•Alshammari, R.; Zincir-Heywood, A.N., "Can Encrypted Traffic be identified without Port Numbers, IP Addresses and Payload Inspection?", Journal of Computer Networks, Elsevier, 2011.
•Alshammari, Riyad; Zincir-Heywood, A. Nur; , "An Investigation on the Identification of VoIP traffic: Case Study on Gtalk and Skype," 6th International Conference on Network and Services Management CNSM 2010), Niagara Falls, Canada, October 25-29, 2010.
Download NIMS2 Data sets:
•GTALK
•PRIMUS
•ZFONE
•ONLINE BANKING