Datasets of transmission throughput collected from network simulations and home Wi-Fi network using Tcpdump tool.
Features are extracted from <.pcap> files using python scripts and saved as <.csv> format.
We have collected HAR for 175 youtube video. These HAR are generated while YouTube video are played using QUIC as transport protocol and while standard TCP+TLS is used as transport protocol.
This paper contributes a DNSSEC deyploment study among top-level and second-level domains. It consists of an NSEC and NSEC3 zone enumeration of all top-level domains as of January 2017.
This collection consists of a list of 5.2 million second-level domains with DNSSEC. It has been retrieved with an NSEC and NSEC3 zone enumeration over all 1372 top-level domains in January 2017.
The raw NSEC records and NSEC3 hash values are available as well. In total, 6.4 million NSEC/NSEC3 records have the DS type set.
The Internet Health Report helps network operators to monitor network conditions. Network performance data is collected with RIPE Atlas and analyzed with a set of tools pinpointing congestion and packet loss.
This dataset describes a measurement of Web API (DOM) browser features used on the open web. Each site in the Alexa 10k was visited using an automated measurement technique described in Snyder et al., “Browser feature usage on the modern web,” in the Proceedings of the 2016 Internet Measurement Conference, (2016) with an instrumented web browser, to count feature usage.
Each site in the Alexa 10k was visited 10 times, 5 times with an unmodified browser, and 5 times with the AdBlock Plus and Ghostery browsing add-ons installed. This dataset records how often 1,390 different Web API / DOM endpoints, taken from 75 Web API standards documents, were used on each site. The dataset further records the difference in feature usage when ad and tracking blocking extensions are present.
This collection contains data gathered using traceroutes from 107 Planet-lab nodes. The nodes performed traceroute using scamper with warts files as output. These files contain traceroute information up to the 4th hop. The sampling rate was 1 traceroute per second when it was possible. The length of the measurement is a week.
Flow data that capture the large NTP DDoS attacks that occurred during the first few months of 2014. The data were collected at Merit Network. They contain all ingress and egress flows at Merit. Dataset is anonymized by a constant substitution of the last 11 bits of the IP addresses.
Data can be requested from https://www.predict.org
This dataset contains traces of active measurements conducted in 2009 and 2010, where simulated RTP video streams were sent from a server at University of Glasgow to measurement boxes placed in the homes of volunteers in the UK and Finland.
Results of a campaign to evaluate a novel active probing technique based on the IP timestamp option able to identify TP addresses. For evaluating both the applicability and the utility of the proposed technique, we perform a large-scale measurement campaign targeting – from multiple vantage points – more than 327 K destinations belonging to about 14K ASes.
An archive of daily FIB dumps from 20 vantage points located in various remote Autonomous Systems, essentially the output of "show ip route" in an easy to parse textual format. Currently, the data set includes Internet2 (AS 11537) and the HBONE (AS 1955), and it contains various full-BGP FIBs as well as smaller FIB instances with internal routes predominantly.
Describes a new approach to topology capture, using partial rather than full route tracing, that aims at obtaining the topology graph rather than full routes.
The dataset reflects the network topology that were used at each round of our NTC experiment. In order to build the Network Topology and the traceroute paths at each round of our measurement study, the dataset is composed of different files in csv format.
Symbols indicate collections or publications with annotations of type
notice or
alert