NICT Darknet Dataset 2022

Japanese Page (日本語)

tags: Darknet Dataset NICT

Dataset overview

This dataset is the darknet traffic data observed by NICTER.
It is a per-packet dataset made under the following conditions.

data type details
timestamp received packet time (UNIX time)
hash[ip.src.upper16] hash value of upper 16-bit source IP address
hash[ip.src.32] hash value of 32-bit source IP address
ip.dst.lower16 lower 16-bit darknet destination IP address
tcp.dstport 16-bit TCP destination port number

Contents of this site

  1. How to use
    If you wish to use this dataset, please see [How to use](#How to use).
  2. Pseudo data
    We present pseudo data in CSV format.
  3. List of data periods and sensor IDs
    Please confirm the period and sensor ID of the data you want to utilize from this list.
    In order to ensure the reproducibility of our research, we have released the data for the period used in our research. We plan to continuously add and update the most recent data according to our research activities.

Differences from NICT Darknet Data Set 2019

In NICT Darknet Data Set 2019, statistical processing was done on each host, so its utility was limited. This dataset does not perform per-host statistical processing but only hashing, so it is considered to be more versatile in its use.



How to use



Pseudo data

This pseudo data is in CSV format.

UNIXTIMEip.src.upper16ip.src.32ip.dst.lower16tcp.dport
1640962800.12111.111111.111.1.2100.10023
1640962800.21222.222222.222.2.4100.1012323
1640962800.21123.123123.123.123.123101.10080
1640962800.33121.121121.121.123.123101.1018080
1640962800.362.22.2.2.2100.102443
UNIXTIME,hash[ip.src.upper16],hash[ip.src.32],ip.dst.lower16,tcp.dport 1640962800.12,2fe1ec63c455bd46152926d283e91a8cc4a5fe4f471c27a56f825d046cdf8185,457d5c7b1a91d24d7747179ea793c009f509378781b7aaaa0c1748791b0108e0,100.100,23 1640962800.21,2d9e8afbdd75fd5a3be91f1fa290d4e43c90486a29519ceecd1ca5fd39dce22f,39825211c3134d68dd26708eb73fcad7c7fc3cf65b7a75e7fa8f9ab7c0c0c38e,100.101,2323 1640962800.21,1f5f57cbe46c479aef35f4dcb66d618c38d68fdc3739abe8b5e6fc0a5484c8fb,2ee37d765230eaa9f69a0508f0fc43589111b9e7c1a8ec26cd768d572defc1f6,101.100,80 1640962800.33,cf31089c853c78cfde5c57687cd3613288bd6ffc6c18dcf61a3a8cde7786d8bf,ea9eb9ad3e94e59103d4554332374c2fb19339ff5ba9e263e489edc6ce739f49,101.101,8080 1640962800.36,7f10d3eecd32bfb1c83b81238d42673b5c21b3c5533a6fa7ba7b5e2cf607430f,717aecfa766c462729db6b7443dbf928b61247142e3e575f9f4ba72a04420ff3,100.102,443


List of data periods and sensor IDs

Please check the period and sensor ID of the data you wish to use.

Data list

period darknet sensor ID (scale) data size references
Oct. 2018 (1 month) A (/17 subnet) 63GB [1--4]
Oct. 2018 (1 month) B (/18 subnet) 40GB [1--4]
Oct. 2018 (1 month) C (/20 subnet) 9.5GB [1--4]
Oct. 2018 (1 month) D (/20 subnet) 11GB [1--4]
Oct. 2018 (1 month) E (/19 subnet) 18GB [1--4]
Oct. 2018 (1 month) F (/18 subnet) 35GB [1--4]
Oct. 2018 (1 month) G (/21 subnet) 5.4GB [1--4]
Oct. 2018 (1 month) H (/21 subnet) 5.1GB [1--4]
Jun. 2019 -- Oct. 2020 (*1) A - H ----- [1 and 5]
09/01/2022 (1 day) D (/20 subnet) 633MB [6]

List of references



Person in charge

Cybersecurity Laboratory, Cybersecurity Research Institute, National Institute of Information and Communications Technology (NICT), Japan.

Contact for inquiries

For inquiries regarding the use of this dataset, please contact the following.

Acknowledgment

This effort was conducted under a contract of ‘‘MITIGATE’’ among ‘‘Research and Development for Expansion of Radio Wave Resources (JPJ000254),’’ which was supported by the Ministry of Internal Affairs and Communications, Japan.


Last updated on Nov 22, 2022
© NICT, Japan.
Chansu Han