Cryptojacking Network Traffic 2021

Published: 8 November 2022| Version 1 | DOI: 10.17632/vskf5bc52z.1
Contributors:
,
,
,

Description

The Cryptojacking Network Traffic 2021 (CNT21) dataset contains a collection of features extracted by network flows that have been generated to detect cryptojacking-related activities at the network level. The dataset includes network flows produced by cryptocurrencies (Bitcoin, Bytecoin, Monero), both in their original form and shaped by VPN software. In addition, CNT21 also contains network flows generated by other mainstream software not related to crypto mining (Skype, Youtube, and other productivity software) that can be used as negative samples. The dataset includes 54 files representing 27 different network flows, divided by direction (either ingoing or outgoing). Eighteen of them were produced by crypto mining activities, while the other nine are not related to cryptocurrencies. For every network flow, the dataset contains two features, i.e., interarrival time and packet size, that can be used to model network traffic, even if encrypted. Out of 54 total flows, 36 are shaped by VPNs (NordVPn or ExpressVPN). The described raw features are presented as textual (.txt) files. In addition, the dataset contains an aggregated data structure (CNT21.mat) containing the same features in an organized form---we also provide the MatLab script (parser.m) we adopted to generate the aggregate data from the raw features. The CNT21 dataset can be used for several purposes, such as detecting cryptojacking via network traffic, discriminating between regular network traffic and traffic shaped by VPNs, and possibly others.

Files

Categories

Network Security, Virtual Private Network, Cryptocurrency, Blockchain

Funding

Qatar National Research Fund

NPRP11S-0109- 180242

Qatar National Research Fund

NPRP12S-0125-190013

Qatar National Research Fund

NPRP12C-0814-190012

Hamad bin Khalifa University

HU.BW.723008.S077.HBKU

Licence