Dataset Viewer

The dataset viewer is not available because its heuristics could not detect any supported data files. You can try uploading some data files, or configuring the data files location manually.

Auto-capture-cryptomining-data

This dataset is the Auto-capture-cryptomining-data portion of the test datasets used in the paper "Cryptomining Traffic Detection via Statistical Filtering and Deep Learning" (IFIP WG 11.9 International Conference on Digital Forensics, 2026). It provides newly captured, well-controlled Monero mining traffic to enable robust evaluation under various conditions.

Dataset Description

Using XMRig, we mined on three public pools and a custom-deployed fake pool. To enhance diversity, we treated variations in pool configurations, such as difficulty adjustments and TLS (Transport Layer Security) toggling, as distinct scenarios, each mined for 10 minutes. Traffic was captured under 12 hardware settings (CPU cores: 2, 4, 8, 12; memory: 4GB, 8GB, 16GB).

The dataset consists of 12 raw PCAP files, representing the traffic collected across these 12 scenarios.

Mining Pool Information

The dataset contains traffic to the following mining pools:

IP Address Description
82.69.122.59 Encrypted mining, public pool (xmr.pool.gntl.co.uk)
54.39.98.237 Encrypted mining, public pool (monerop.com)
45.10.20.100 Encrypted mining, public pool
192.168.80.30 Plaintext/encrypted mixed, custom-built fake pool (self-deployed virtual pool)

Data Usage

This dataset is intended for academic and research purposes. If you use this data, please cite our paper:

(Placeholder for the complete citation of your IFIP paper)

Structure

Auto-capture-cryptomining-data/
β”œβ”€β”€ config_1.pcap
β”œβ”€β”€ config_2.pcap
β”œβ”€β”€ ...
└── config_12.pcap

License

This dataset is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. You are free to share and adapt the material for any purpose, even commercially, as long as you give appropriate credit.

Downloads last month
7