Open Data at CIRCL
CIRCL advocates data sharing and knows that sharing Open Data can lead to new research, analyses, software or services that could improve security on the long-term. We also hope that the data shared can be used for any usage including commercial or non-commercial security services within Luxembourg and abroad.
Open Data Definition
“Open data and content can be freely used, modified, and shared by anyone for any purpose” as defined by opendefinition.org.
Open Data Available at CIRCL
CVE daily JSON dump
A daily JSON dump of all the CVE (Common Vulnerabilities and Exposures) is published with the expanded values as seen on https://cve.circl.lu/. The file is a gzip compressed JSON file (>190MB):
BGP Ranking data dump per AS number
BGP Ranking is a public service developed and operated by CIRCL starting from 2012 until today with the ranking of malicious activities seen per BGP AS number (e.g. ISP, Hosting companies). The historical data can be queried using the following format:
As an example, to download the historical data for AS6661 use the following format: http://bgpranking.circl.lu/csv/6661.
Allaple malware infection statistics (raw data)
Allaple worm is a malware family still infecting multiple systems on the Internet. The statistics collected from our honeypot are available for the year 2015 at the following location:
CIRCL operational statistics
The operational statistics cover the activities related to the incident response activities of CIRCL especially in regards to the reporting (e.g. incident reports, request for analysis or support during computer security incident) and notifications (e.g. take-down notification, notification about vulnerability) from/to third parties.
Academic researchers who used our Open Data
- Ralph Holz , Johanna Amann , Olivier Mehani , Matthias Wachs , Mohamed Ali Kaafar. “TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication”. download
- Konte, Maria, Roberto Perdisci, and Nick Feamster. “ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes.” Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. ACM, 2015. download
- Wagner, Christoph, et al. “ASMATRA: Ranking ASs providing transit service to malware hosters.” Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013. download
- Ghafir, Ibrahim, and Václav Přenosil. “ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS.” DISTANCE LEARNING, SIMULATION AND COMMUNICATION 2015 (2015): 34. download
- Ghafir, Ibrahim, and Vaclav Prenosil. “Malicious File Hash Detection and Drive-by Download Attacks.” Proceedings of the Second International Conference on Computer and Communication Technologies. Springer India, 2016. download
- Vykopal, Jan. Flow-based Brute-force Attack Detection in Large and High-speed Networks. Diss. PhD thesis, Masaryk University, Brno, Czech Republic, 2013. download
If you used our data for your research, feel free to contact us if you want to be listed.