DatCat℠Internet Measurement Data Catalog

Log in | Create an Account

Note: for a better experience, enable javascript and stylesheets in your browser.

Search for in
Enter one or more word stems or quoted phrases. Wildcards “*” and “?” are allowed.
Contact us

Recently Cataloged Collections and Publications

20 Most Recently Contributed Collections and Publications

WLAN Transmission Throughput - 4 files, 2017‑11‑30 to 2017‑11‑30, contributed 2018‑01‑13
Datasets of transmission throughput collected from network simulations and home Wi-Fi network using Tcpdump tool. Features are extracted from <.pcap> files using python scripts and saved as <.csv> format.
HAR - , contributed 2017‑05‑17
We have collected HAR for 175 youtube video. These HAR are generated while YouTube video are played using QUIC as transport protocol and while standard TCP+TLS is used as transport protocol.
Measurement Survey of Server-Side DNSSEC Adoption - , contributed 2017‑05‑02
This paper contributes a DNSSEC deyploment study among top-level and second-level domains. It consists of an NSEC and NSEC3 zone enumeration of all top-level domains as of January 2017.
Domain names with DNSSEC (Jan 2017) - 1 file, 2017‑01‑04 to 2017‑01‑28, contributed 2017‑05‑02
This collection consists of a list of 5.2 million second-level domains with DNSSEC. It has been retrieved with an NSEC and NSEC3 zone enumeration over all 1372 top-level domains in January 2017. The raw NSEC records and NSEC3 hash values are available as well. In total, 6.4 million NSEC/NSEC3 records have the DS type set.
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements - , contributed 2017‑04‑28
Description of the techniques used to pinpoint delay and forwarding anomalies in traceroute results.
Congestion and forwarding anomalies - starting 2016‑12‑31, contributed 2017‑04‑28
The Internet Health Report helps network operators to monitor network conditions. Network performance data is collected with RIPE Atlas and analyzed with a set of tools pinpointing congestion and packet loss.
Web API usage in the Alexa 10k - 1 file, 2016‑04‑01 to 2016‑04‑30, contributed 2016‑08‑23
This dataset describes a measurement of Web API (DOM) browser features used on the open web. Each site in the Alexa 10k was visited using an automated measurement technique described in Snyder et al., “Browser feature usage on the modern web,” in the Proceedings of the 2016 Internet Measurement Conference, (2016) with an instrumented web browser, to count feature usage. Each site in the Alexa 10k was visited 10 times, 5 times with an unmodified browser, and 5 times with the AdBlock Plus and Ghostery browsing add-ons installed. This dataset records how often 1,390 different Web API / DOM endpoints, taken from 75 Web API standards documents, were used on each site. The dataset further records the difference in feature usage when ad and tracking blocking extensions are present.
Traceroutes for statistical analysis of latency - 107 files, 2016‑04‑07 to 2016‑04‑14, contributed 2016‑05‑06
This collection contains data gathered using traceroutes from 107 Planet-lab nodes. The nodes performed traceroute using scamper with warts files as output. These files contain traceroute information up to the 4th hop. The sampling rate was 1 traceroute per second when it was possible. The length of the measurement is a week.
Merit BGP Route Hijacking 2015 - 1490 files, 2015‑05‑01 to 2015‑06‑01, contributed 2016‑02‑29
A BGP route hijacking event regarding a /24 block. Merit's BGP tables have captured the event.
Merit NTP DDoS 2014 - 9386 files, 2014‑02‑14 to 2014‑02‑28, contributed 2016‑02‑24
Flow data that capture the large NTP DDoS attacks that occurred during the first few months of 2014. The data were collected at Merit Network. They contain all ingress and egress flows at Merit. Dataset is anonymized by a constant substitution of the last 11 bits of the IP addresses. Data can be requested from https://www.predict.org
Examining How the Great Firewall Discovers Hidden Circumvention Servers - 1 file, 2010‑01‑01 to 2015‑08‑01, contributed 2015‑09‑03
Comprehensive analysis of how the Great Firewall of China blocks circumvention proxies, mostly focused on the Tor network.
GFW Active Probing 2014/2015 - 1 file, contributed 2015‑09‑03
Pcap capturing several hundred connections of active probes originating from China.
Characterizing Smartphone Usage Patterns from Millions of Android Users - 2014‑04‑30 to 2014‑09‑29, contributed 2015‑08‑17
This is a dataset with millions of Android users in China.
RTP streaming over ADSL/Cable networks - 2009‑06‑27 to 2010‑09‑04, contributed 2015‑01‑10
This dataset contains traces of active measurements conducted in 2009 and 2010, where simulated RTP video streams were sent from a server at University of Glasgow to measurement boxes placed in the homes of volunteers in the UK and Finland.
Project Sonar: IPv4 UDP Scans - starting 2014‑06‑09, contributed 2015‑01‑01
Project Sonar includes a regular scan of all IPv4 hosts for 13+ UDP services
Detecting third-party addresses in traceroute traces: dataset, technique and tool - 1 file, contributed 2014‑09‑23
Results of a campaign to evaluate a novel active probing technique based on the IP timestamp option able to identify TP addresses. For evaluating both the applicability and the utility of the proposed technique, we perform a large-scale measurement campaign targeting – from multiple vantage points – more than 327 K destinations belonging to about 14K ASes.
Detecting Third-Party Addresses in Traceroute Traces with IP Timestamp Option - 1 file, contributed 2014‑09‑22
Describes active probing technique based on the IP timestamp option able to identify Third-Party addresses.
IPv4 FIB archives - 6000 files, starting 2013‑11‑12, contributed 2014‑09‑22
An archive of daily FIB dumps from 20 vantage points located in various remote Autonomous Systems, essentially the output of "show ip route" in an easy to parse textual format. Currently, the data set includes Internet2 (AS 11537) and the HBONE (AS 1955), and it contains various full-BGP FIBs as well as smaller FIB instances with internal routes predominantly.
Efficient IP-Level Network Topology Capture - 1 file, contributed 2014‑09‑22
Describes a new approach to topology capture, using partial rather than full route tracing, that aims at obtaining the topology graph rather than full routes.
NTC: Network Topology Capture Dataset - 1 file, 2010‑05‑25 to 2010‑07‑25, contributed 2014‑09‑22
The dataset reflects the network topology that were used at each round of our NTC experiment. In order to build the Network Topology and the traceroute paths at each round of our measurement study, the dataset is composed of different files in csv format.
Symbols indicate collections or publications with annotations of type (N) notice or (A) alert