pyToshka commited on
Commit
83238c8
·
verified ·
1 Parent(s): 592b57d

Upload dataset - Session upload_1758558909

Browse files
Files changed (8) hide show
  1. .gitattributes +2 -0
  2. README.md +318 -0
  3. data_files.json +7 -0
  4. metadata.json +262 -0
  5. train.csv +3 -0
  6. train.jsonl +3 -0
  7. train.parquet +3 -0
  8. upload_manifest.json +15 -0
.gitattributes CHANGED
@@ -57,3 +57,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
 
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
60
+ train.csv filter=lfs diff=lfs merge=lfs -text
61
+ train.jsonl filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,318 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ language:
3
+ - en
4
+ task_categories:
5
+ - tabular-classification
6
+ - other
7
+ task_ids:
8
+ - tabular-multi-class-classification
9
+ - multi-class-classification
10
+ pretty_name: Honeypot Cybersecurity Dataset
11
+ size_categories:
12
+ - 10K<n<100K
13
+ source_datasets:
14
+ - original
15
+ license: bsd-3-clause
16
+ tags:
17
+ - cybersecurity
18
+ - honeypot
19
+ - threat-detection
20
+ - network-security
21
+ - intrusion-detection
22
+ - tabular
23
+ - security
24
+ - anomaly-detection
25
+ - classification
26
+ multilinguality:
27
+ - monolingual
28
+ annotations_creators:
29
+ - machine-generated
30
+ paperswithcode_id: null
31
+ dataset_info:
32
+ features:
33
+ - name: payload
34
+ dtype: string
35
+ - name: dest_ip
36
+ dtype: string
37
+ - name: metadata
38
+ dtype: string
39
+ - name: src_ip
40
+ dtype: string
41
+ - name: "@timestamp"
42
+ dtype: string
43
+ - name: honeypot_hostname
44
+ dtype: string
45
+ - name: dest_port
46
+ dtype: int64
47
+ - name: in_iface
48
+ dtype: string
49
+ - name: pkt_src
50
+ dtype: string
51
+ - name: geoip_ext
52
+ dtype: string
53
+ - name: proto
54
+ dtype: string
55
+ - name: honeypot_ip_int
56
+ dtype: string
57
+ - name: event_type
58
+ dtype: string
59
+ - name: alert
60
+ dtype: string
61
+ - name: direction
62
+ dtype: string
63
+ - name: geoip
64
+ dtype: string
65
+ - name: host
66
+ dtype: string
67
+ - name: type
68
+ dtype: string
69
+ - name: payload_printable
70
+ dtype: string
71
+ - name: "@version"
72
+ dtype: string
73
+ - name: flow
74
+ dtype: string
75
+ - name: src_port
76
+ dtype: string
77
+ - name: honeypot_ip_ext
78
+ dtype: string
79
+ - name: stream
80
+ dtype: string
81
+ - name: flow_id
82
+ dtype: string
83
+ - name: timestamp
84
+ dtype: string
85
+ - name: mitre_techniques
86
+ dtype: string
87
+ - name: attack_vectors
88
+ dtype: string
89
+ - name: mitre_tactic
90
+ dtype: string
91
+ - name: mitre_technique
92
+ dtype: string
93
+ - name: confidence_score
94
+ dtype: string
95
+ - name: is_malicious
96
+ dtype: bool
97
+ - name: severity
98
+ dtype: string
99
+ - name: primary_label
100
+ dtype: string
101
+ - name: subject
102
+ dtype: string
103
+ - name: os
104
+ dtype: string
105
+ - name: dist
106
+ dtype: string
107
+ - name: mod
108
+ dtype: string
109
+ - name: params
110
+ dtype: string
111
+ - name: raw_sig
112
+ dtype: string
113
+ - name: rdp
114
+ dtype: string
115
+ - name: tags
116
+ dtype: string
117
+ - name: app_proto
118
+ dtype: string
119
+ - name: tx_guessed
120
+ dtype: string
121
+ - name: tx_id
122
+ dtype: string
123
+ - name: fatt_ssh
124
+ dtype: string
125
+ - name: protocol
126
+ dtype: string
127
+ - name: link
128
+ dtype: string
129
+ - name: raw_mtu
130
+ dtype: string
131
+ - name: ssh
132
+ dtype: string
133
+ - name: app_proto_tc
134
+ dtype: string
135
+ - name: tcp
136
+ dtype: string
137
+ - name: uptime
138
+ dtype: string
139
+ - name: raw_freq
140
+ dtype: string
141
+ - name: ip_rep
142
+ dtype: string
143
+ - name: anomaly
144
+ dtype: string
145
+ - name: lang
146
+ dtype: string
147
+ - name: app
148
+ dtype: string
149
+ - name: http
150
+ dtype: string
151
+ - name: fatt_rdp
152
+ dtype: string
153
+ - name: tls
154
+ dtype: string
155
+ - name: fileinfo
156
+ dtype: string
157
+ - name: reason
158
+ dtype: string
159
+ - name: raw_hits
160
+ dtype: string
161
+ - name: fatt_tls
162
+ dtype: string
163
+ - name: smtp
164
+ dtype: string
165
+ - name: smb
166
+ dtype: string
167
+ - name: files
168
+ dtype: string
169
+ - name: ftp
170
+ dtype: string
171
+ - name: fatt_http
172
+ dtype: string
173
+ - name: icmp_type
174
+ dtype: string
175
+ - name: icmp_code
176
+ dtype: string
177
+ - name: mqtt
178
+ dtype: string
179
+ - name: pgsql
180
+ dtype: string
181
+ - name: dcerpc
182
+ dtype: string
183
+ - name: app_proto_ts
184
+ dtype: string
185
+ - name: commands
186
+ dtype: string
187
+ splits:
188
+ - name: train
189
+ num_bytes: 145729370
190
+ num_examples: 29545
191
+ download_size: 145729370
192
+ dataset_size: 145729370
193
+ config_name: default
194
+ ---
195
+
196
+ # network-intrusion-detection
197
+
198
+ ## Dataset Description
199
+
200
+ This dataset contains cybersecurity events collected from honeypot infrastructure.
201
+
202
+ The data has been processed and feature-engineered for machine learning applications in threat detection and security analytics.
203
+
204
+ ## Feature Categories
205
+
206
+ ### Network Features
207
+ - Connection flow statistics (bytes, packets, duration)
208
+ - Protocol-specific metrics
209
+ - Geographic information
210
+ - IP reputation data
211
+
212
+ ### Behavioral Features
213
+ - Session patterns and command sequences
214
+ - User-agent analysis
215
+ - Attack pattern identification
216
+ - Protocol fingerprinting
217
+
218
+ ### Temporal Features
219
+ - Time-based aggregations
220
+ - Frequency analysis
221
+ - Campaign detection indicators
222
+ - Attack timing patterns
223
+
224
+ ### Security Labels
225
+ - MITRE ATT&CK technique mappings
226
+ - Alert severity classifications
227
+ - Automatic threat categorization
228
+ - Binary maliciousness indicators
229
+
230
+ ## Usage Example
231
+
232
+ ```python
233
+ from datasets import load_dataset
234
+
235
+ # Load the dataset
236
+ dataset = load_dataset("pyToshka/network-intrusion-detection")
237
+ train_data = dataset["train"]
238
+
239
+ # Basic exploration
240
+ print("Dataset features:", list(train_data.features.keys()))
241
+ print("Total samples:", len(train_data))
242
+
243
+ from collections import Counter
244
+
245
+ # Example: Filter RDP attacks
246
+ rdp_events = train_data.filter(lambda x: x['app_proto'] == 'rdp')
247
+ print("RDP events:", len(rdp_events))
248
+
249
+ # Example: Analyze attack vectors
250
+ if len(rdp_events) > 0:
251
+ attack_vectors = Counter([event['attack_vectors'] for event in rdp_events if event['attack_vectors']])
252
+ print("RDP Attack vectors:")
253
+ for vector, count in attack_vectors.most_common():
254
+ print(f" {vector}: {count}")
255
+
256
+ # Example: Analyze protocol distribution
257
+ protocols = Counter([event['app_proto'] for event in train_data if event['app_proto']])
258
+ print("Protocol distribution:")
259
+ for proto, count in protocols.most_common():
260
+ print(f" {proto if proto else '(empty)'}: {count}")
261
+
262
+ # Example: Malicious events analysis
263
+ malicious_count = sum(1 for event in train_data if event['is_malicious'])
264
+ print(f"Malicious events: {malicious_count}/{len(train_data)} ({malicious_count/len(train_data)*100:.1f}%)")
265
+ ```
266
+
267
+ ## Data Fields
268
+
269
+ The dataset contains 77 features across several categories:
270
+
271
+ ### Network Features
272
+ - `dest_ip`: Network-related information
273
+ - `src_ip`: Network-related information
274
+ - `dest_port`: Network-related information
275
+ - `geoip_ext`: Network-related information
276
+ - `honeypot_ip_int`: Network-related information
277
+ - ... and 7 more network features
278
+
279
+ ### Behavioral Features
280
+ - `commands`: Behavioral analysis data
281
+
282
+ ### Temporal Features
283
+ - `@timestamp`: Time-based information
284
+ - `timestamp`: Time-based information
285
+ - `uptime`: Time-based information
286
+
287
+ ### Security Features
288
+ - `alert`: Security and threat intelligence
289
+ - `mitre_techniques`: Security and threat intelligence
290
+ - `attack_vectors`: Security and threat intelligence
291
+ - `mitre_tactic`: Security and threat intelligence
292
+ - `mitre_technique`: Security and threat intelligence
293
+ - ... and 1 more security features
294
+
295
+ ## Data Splits
296
+
297
+ | Split | Examples |
298
+ |-------|----------|
299
+ | train | 29,545 |
300
+
301
+ ## Dataset Statistics
302
+
303
+ - **Total size**: ~139.0 MB
304
+ - **Average record size**: ~4932 bytes
305
+ - **Feature completeness**: 100.0%
306
+
307
+ ## Ethical Considerations
308
+
309
+ This dataset contains real honeypot data representing actual attack attempts. Users should:
310
+
311
+ - **Privacy**: Respect anonymization measures implemented in the dataset
312
+ - **Research Use**: Use data only for legitimate cybersecurity research and education
313
+ - **Responsible Disclosure**: Follow responsible disclosure practices for any findings
314
+ - **Legal Compliance**: Comply with applicable laws and regulations in your jurisdiction
315
+ - **No Reidentification**: Do not attempt to identify or contact attackers
316
+ - **Defensive Purpose**: Use insights for defensive security improvements only
317
+
318
+
data_files.json ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ {
2
+ "train": {
3
+ "csv": "train.csv",
4
+ "parquet": "train.parquet",
5
+ "jsonl": "train.jsonl"
6
+ }
7
+ }
metadata.json ADDED
@@ -0,0 +1,262 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "dataset_info": {
3
+ "name": "network-intrusion-detection",
4
+ "version": "1.0.0",
5
+ "description": "Cybersecurity dataset from honeypot infrastructure",
6
+ "total_samples": 29545,
7
+ "features": 77,
8
+ "creation_timestamp": "2025-09-22T16:35:07.148369+00:00",
9
+ "data_source": "Honeypot Infrastructure",
10
+ "honeypot_types": {},
11
+ "time_range": {
12
+ "start": "",
13
+ "end": "2025-09-22T16:33:45.474857+00:00"
14
+ }
15
+ },
16
+ "statistics": {
17
+ "total_events": 40000,
18
+ "successful_extractions": 40000,
19
+ "feature_extraction_time": 68.711894,
20
+ "dataset_creation_time": 0,
21
+ "quality_score": 0.0
22
+ },
23
+ "feature_schema": {
24
+ "payload": "object",
25
+ "dest_ip": "object",
26
+ "metadata": "object",
27
+ "src_ip": "object",
28
+ "@timestamp": "object",
29
+ "honeypot_hostname": "object",
30
+ "dest_port": "int64",
31
+ "in_iface": "object",
32
+ "pkt_src": "object",
33
+ "geoip_ext": "object",
34
+ "proto": "object",
35
+ "honeypot_ip_int": "object",
36
+ "event_type": "object",
37
+ "alert": "object",
38
+ "direction": "object",
39
+ "geoip": "object",
40
+ "host": "object",
41
+ "type": "object",
42
+ "payload_printable": "object",
43
+ "@version": "object",
44
+ "flow": "object",
45
+ "src_port": "object",
46
+ "honeypot_ip_ext": "object",
47
+ "stream": "object",
48
+ "flow_id": "object",
49
+ "timestamp": "object",
50
+ "mitre_techniques": "object",
51
+ "attack_vectors": "object",
52
+ "mitre_tactic": "object",
53
+ "mitre_technique": "object",
54
+ "confidence_score": "object",
55
+ "is_malicious": "bool",
56
+ "severity": "object",
57
+ "primary_label": "object",
58
+ "subject": "object",
59
+ "os": "object",
60
+ "dist": "object",
61
+ "mod": "object",
62
+ "params": "object",
63
+ "raw_sig": "object",
64
+ "rdp": "object",
65
+ "tags": "object",
66
+ "app_proto": "object",
67
+ "tx_guessed": "object",
68
+ "tx_id": "object",
69
+ "fatt_ssh": "object",
70
+ "protocol": "object",
71
+ "link": "object",
72
+ "raw_mtu": "object",
73
+ "ssh": "object",
74
+ "app_proto_tc": "object",
75
+ "tcp": "object",
76
+ "uptime": "object",
77
+ "raw_freq": "object",
78
+ "ip_rep": "object",
79
+ "anomaly": "object",
80
+ "lang": "object",
81
+ "app": "object",
82
+ "http": "object",
83
+ "fatt_rdp": "object",
84
+ "tls": "object",
85
+ "fileinfo": "object",
86
+ "reason": "object",
87
+ "raw_hits": "object",
88
+ "fatt_tls": "object",
89
+ "smtp": "object",
90
+ "smb": "object",
91
+ "files": "object",
92
+ "ftp": "object",
93
+ "fatt_http": "object",
94
+ "icmp_type": "object",
95
+ "icmp_code": "object",
96
+ "mqtt": "object",
97
+ "pgsql": "object",
98
+ "dcerpc": "object",
99
+ "app_proto_ts": "object",
100
+ "commands": "object"
101
+ },
102
+ "quality_metrics": {
103
+ "completeness": {
104
+ "payload": 1.0,
105
+ "dest_ip": 1.0,
106
+ "metadata": 1.0,
107
+ "src_ip": 1.0,
108
+ "@timestamp": 1.0,
109
+ "honeypot_hostname": 1.0,
110
+ "dest_port": 1.0,
111
+ "in_iface": 1.0,
112
+ "pkt_src": 1.0,
113
+ "geoip_ext": 1.0,
114
+ "proto": 1.0,
115
+ "honeypot_ip_int": 1.0,
116
+ "event_type": 1.0,
117
+ "alert": 1.0,
118
+ "direction": 1.0,
119
+ "geoip": 1.0,
120
+ "host": 1.0,
121
+ "type": 1.0,
122
+ "payload_printable": 1.0,
123
+ "@version": 1.0,
124
+ "flow": 1.0,
125
+ "src_port": 1.0,
126
+ "honeypot_ip_ext": 1.0,
127
+ "stream": 1.0,
128
+ "flow_id": 1.0,
129
+ "timestamp": 1.0,
130
+ "mitre_techniques": 1.0,
131
+ "attack_vectors": 1.0,
132
+ "mitre_tactic": 1.0,
133
+ "mitre_technique": 1.0,
134
+ "confidence_score": 1.0,
135
+ "is_malicious": 1.0,
136
+ "severity": 1.0,
137
+ "primary_label": 1.0,
138
+ "subject": 1.0,
139
+ "os": 1.0,
140
+ "dist": 1.0,
141
+ "mod": 1.0,
142
+ "params": 1.0,
143
+ "raw_sig": 1.0,
144
+ "rdp": 1.0,
145
+ "tags": 1.0,
146
+ "app_proto": 1.0,
147
+ "tx_guessed": 1.0,
148
+ "tx_id": 1.0,
149
+ "fatt_ssh": 1.0,
150
+ "protocol": 1.0,
151
+ "link": 1.0,
152
+ "raw_mtu": 1.0,
153
+ "ssh": 1.0,
154
+ "app_proto_tc": 1.0,
155
+ "tcp": 1.0,
156
+ "uptime": 1.0,
157
+ "raw_freq": 1.0,
158
+ "ip_rep": 1.0,
159
+ "anomaly": 1.0,
160
+ "lang": 1.0,
161
+ "app": 1.0,
162
+ "http": 1.0,
163
+ "fatt_rdp": 1.0,
164
+ "tls": 1.0,
165
+ "fileinfo": 1.0,
166
+ "reason": 1.0,
167
+ "raw_hits": 1.0,
168
+ "fatt_tls": 1.0,
169
+ "smtp": 1.0,
170
+ "smb": 1.0,
171
+ "files": 1.0,
172
+ "ftp": 1.0,
173
+ "fatt_http": 1.0,
174
+ "icmp_type": 1.0,
175
+ "icmp_code": 1.0,
176
+ "mqtt": 1.0,
177
+ "pgsql": 1.0,
178
+ "dcerpc": 1.0,
179
+ "app_proto_ts": 1.0,
180
+ "commands": 1.0
181
+ },
182
+ "uniqueness": {
183
+ "payload": 0.007886275173464206,
184
+ "dest_ip": 3.384667456422407e-05,
185
+ "metadata": 0.0013200203080047386,
186
+ "src_ip": 0.025351159248603823,
187
+ "@timestamp": 0.3710610932475884,
188
+ "honeypot_hostname": 0.010120155694702995,
189
+ "dest_port": 0.0488069047216111,
190
+ "in_iface": 6.769334912844813e-05,
191
+ "pkt_src": 0.00013538669825689627,
192
+ "geoip_ext": 0.0007446268404129294,
193
+ "proto": 0.0001015400236926722,
194
+ "honeypot_ip_int": 0.7991538331358944,
195
+ "event_type": 0.000507700118463361,
196
+ "alert": 0.012117109493992216,
197
+ "direction": 0.0001015400236926722,
198
+ "geoip": 0.047486884413606364,
199
+ "host": 0.010120155694702995,
200
+ "type": 0.0001015400236926722,
201
+ "payload_printable": 0.007886275173464206,
202
+ "@version": 3.384667456422407e-05,
203
+ "flow": 0.23344051446945338,
204
+ "src_port": 0.1540362159417837,
205
+ "honeypot_ip_ext": 3.384667456422407e-05,
206
+ "stream": 0.0001015400236926722,
207
+ "flow_id": 0.16865797935352853,
208
+ "timestamp": 0.3551193095278389,
209
+ "mitre_techniques": 3.384667456422407e-05,
210
+ "attack_vectors": 3.384667456422407e-05,
211
+ "mitre_tactic": 3.384667456422407e-05,
212
+ "mitre_technique": 3.384667456422407e-05,
213
+ "confidence_score": 3.384667456422407e-05,
214
+ "is_malicious": 3.384667456422407e-05,
215
+ "severity": 3.384667456422407e-05,
216
+ "primary_label": 6.769334912844813e-05,
217
+ "subject": 0.0001015400236926722,
218
+ "os": 0.000507700118463361,
219
+ "dist": 0.0009138602132340497,
220
+ "mod": 0.0003046200710780166,
221
+ "params": 0.00023692672194956845,
222
+ "raw_sig": 0.012015569470299543,
223
+ "rdp": 0.0005753934675918091,
224
+ "tags": 6.769334912844813e-05,
225
+ "app_proto": 0.00044000676933491283,
226
+ "tx_guessed": 6.769334912844813e-05,
227
+ "tx_id": 0.00016923337282112033,
228
+ "fatt_ssh": 0.0012861736334405145,
229
+ "protocol": 0.00016923337282112033,
230
+ "link": 0.0003046200710780166,
231
+ "raw_mtu": 0.0007107801658487054,
232
+ "ssh": 0.0013200203080047386,
233
+ "app_proto_tc": 0.00016923337282112033,
234
+ "tcp": 0.012286342866813335,
235
+ "uptime": 0.019969537992892198,
236
+ "raw_freq": 0.017871044169910307,
237
+ "ip_rep": 0.00013538669825689627,
238
+ "anomaly": 0.00016923337282112033,
239
+ "lang": 0.00013538669825689627,
240
+ "app": 0.00013538669825689627,
241
+ "http": 0.007040108309358605,
242
+ "fatt_rdp": 0.0001015400236926722,
243
+ "tls": 0.0011507869351836183,
244
+ "fileinfo": 0.0002030800473853444,
245
+ "reason": 0.0007107801658487054,
246
+ "raw_hits": 0.0017261804027754273,
247
+ "fatt_tls": 0.001556947029954307,
248
+ "smtp": 6.769334912844813e-05,
249
+ "smb": 0.0008123201895413775,
250
+ "files": 0.0001015400236926722,
251
+ "ftp": 0.0002030800473853444,
252
+ "fatt_http": 0.0002030800473853444,
253
+ "icmp_type": 6.769334912844813e-05,
254
+ "icmp_code": 0.00013538669825689627,
255
+ "mqtt": 0.00013538669825689627,
256
+ "pgsql": 0.00013538669825689627,
257
+ "dcerpc": 6.769334912844813e-05,
258
+ "app_proto_ts": 6.769334912844813e-05,
259
+ "commands": 3.384667456422407e-05
260
+ }
261
+ }
262
+ }
train.csv ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:70c8e27c894702dd21c4b51708a7ad5a343a8af6a0da1529a632bfb22b0dc7cf
3
+ size 40921169
train.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0ce9197ac537d14096558061f6afcd2531a78411f35b030c4355efcf71c7c118
3
+ size 69431922
train.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b7e602e1b2d26b1a38c036e744181b1735e7550a4348d29a9319721d7d3f20f0
3
+ size 2140196
upload_manifest.json ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "upload_session_id": "upload_1758558909",
3
+ "preparation_timestamp": "2025-09-22T16:35:11.452405+00:00",
4
+ "source_path": "outputs/ml_pipeline/network-intrusion-detection",
5
+ "dataset_format": "huggingface",
6
+ "files_prepared": [
7
+ "train.jsonl",
8
+ "train.parquet",
9
+ "metadata.json",
10
+ "README.md",
11
+ "data_files.json",
12
+ "train.csv"
13
+ ],
14
+ "total_size_bytes": 112508258
15
+ }