Upload dataset - Session upload_1758558909
Browse files- .gitattributes +2 -0
- README.md +318 -0
- data_files.json +7 -0
- metadata.json +262 -0
- train.csv +3 -0
- train.jsonl +3 -0
- train.parquet +3 -0
- upload_manifest.json +15 -0
.gitattributes
CHANGED
|
@@ -57,3 +57,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
+
train.csv filter=lfs diff=lfs merge=lfs -text
|
| 61 |
+
train.jsonl filter=lfs diff=lfs merge=lfs -text
|
README.md
ADDED
|
@@ -0,0 +1,318 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
language:
|
| 3 |
+
- en
|
| 4 |
+
task_categories:
|
| 5 |
+
- tabular-classification
|
| 6 |
+
- other
|
| 7 |
+
task_ids:
|
| 8 |
+
- tabular-multi-class-classification
|
| 9 |
+
- multi-class-classification
|
| 10 |
+
pretty_name: Honeypot Cybersecurity Dataset
|
| 11 |
+
size_categories:
|
| 12 |
+
- 10K<n<100K
|
| 13 |
+
source_datasets:
|
| 14 |
+
- original
|
| 15 |
+
license: bsd-3-clause
|
| 16 |
+
tags:
|
| 17 |
+
- cybersecurity
|
| 18 |
+
- honeypot
|
| 19 |
+
- threat-detection
|
| 20 |
+
- network-security
|
| 21 |
+
- intrusion-detection
|
| 22 |
+
- tabular
|
| 23 |
+
- security
|
| 24 |
+
- anomaly-detection
|
| 25 |
+
- classification
|
| 26 |
+
multilinguality:
|
| 27 |
+
- monolingual
|
| 28 |
+
annotations_creators:
|
| 29 |
+
- machine-generated
|
| 30 |
+
paperswithcode_id: null
|
| 31 |
+
dataset_info:
|
| 32 |
+
features:
|
| 33 |
+
- name: payload
|
| 34 |
+
dtype: string
|
| 35 |
+
- name: dest_ip
|
| 36 |
+
dtype: string
|
| 37 |
+
- name: metadata
|
| 38 |
+
dtype: string
|
| 39 |
+
- name: src_ip
|
| 40 |
+
dtype: string
|
| 41 |
+
- name: "@timestamp"
|
| 42 |
+
dtype: string
|
| 43 |
+
- name: honeypot_hostname
|
| 44 |
+
dtype: string
|
| 45 |
+
- name: dest_port
|
| 46 |
+
dtype: int64
|
| 47 |
+
- name: in_iface
|
| 48 |
+
dtype: string
|
| 49 |
+
- name: pkt_src
|
| 50 |
+
dtype: string
|
| 51 |
+
- name: geoip_ext
|
| 52 |
+
dtype: string
|
| 53 |
+
- name: proto
|
| 54 |
+
dtype: string
|
| 55 |
+
- name: honeypot_ip_int
|
| 56 |
+
dtype: string
|
| 57 |
+
- name: event_type
|
| 58 |
+
dtype: string
|
| 59 |
+
- name: alert
|
| 60 |
+
dtype: string
|
| 61 |
+
- name: direction
|
| 62 |
+
dtype: string
|
| 63 |
+
- name: geoip
|
| 64 |
+
dtype: string
|
| 65 |
+
- name: host
|
| 66 |
+
dtype: string
|
| 67 |
+
- name: type
|
| 68 |
+
dtype: string
|
| 69 |
+
- name: payload_printable
|
| 70 |
+
dtype: string
|
| 71 |
+
- name: "@version"
|
| 72 |
+
dtype: string
|
| 73 |
+
- name: flow
|
| 74 |
+
dtype: string
|
| 75 |
+
- name: src_port
|
| 76 |
+
dtype: string
|
| 77 |
+
- name: honeypot_ip_ext
|
| 78 |
+
dtype: string
|
| 79 |
+
- name: stream
|
| 80 |
+
dtype: string
|
| 81 |
+
- name: flow_id
|
| 82 |
+
dtype: string
|
| 83 |
+
- name: timestamp
|
| 84 |
+
dtype: string
|
| 85 |
+
- name: mitre_techniques
|
| 86 |
+
dtype: string
|
| 87 |
+
- name: attack_vectors
|
| 88 |
+
dtype: string
|
| 89 |
+
- name: mitre_tactic
|
| 90 |
+
dtype: string
|
| 91 |
+
- name: mitre_technique
|
| 92 |
+
dtype: string
|
| 93 |
+
- name: confidence_score
|
| 94 |
+
dtype: string
|
| 95 |
+
- name: is_malicious
|
| 96 |
+
dtype: bool
|
| 97 |
+
- name: severity
|
| 98 |
+
dtype: string
|
| 99 |
+
- name: primary_label
|
| 100 |
+
dtype: string
|
| 101 |
+
- name: subject
|
| 102 |
+
dtype: string
|
| 103 |
+
- name: os
|
| 104 |
+
dtype: string
|
| 105 |
+
- name: dist
|
| 106 |
+
dtype: string
|
| 107 |
+
- name: mod
|
| 108 |
+
dtype: string
|
| 109 |
+
- name: params
|
| 110 |
+
dtype: string
|
| 111 |
+
- name: raw_sig
|
| 112 |
+
dtype: string
|
| 113 |
+
- name: rdp
|
| 114 |
+
dtype: string
|
| 115 |
+
- name: tags
|
| 116 |
+
dtype: string
|
| 117 |
+
- name: app_proto
|
| 118 |
+
dtype: string
|
| 119 |
+
- name: tx_guessed
|
| 120 |
+
dtype: string
|
| 121 |
+
- name: tx_id
|
| 122 |
+
dtype: string
|
| 123 |
+
- name: fatt_ssh
|
| 124 |
+
dtype: string
|
| 125 |
+
- name: protocol
|
| 126 |
+
dtype: string
|
| 127 |
+
- name: link
|
| 128 |
+
dtype: string
|
| 129 |
+
- name: raw_mtu
|
| 130 |
+
dtype: string
|
| 131 |
+
- name: ssh
|
| 132 |
+
dtype: string
|
| 133 |
+
- name: app_proto_tc
|
| 134 |
+
dtype: string
|
| 135 |
+
- name: tcp
|
| 136 |
+
dtype: string
|
| 137 |
+
- name: uptime
|
| 138 |
+
dtype: string
|
| 139 |
+
- name: raw_freq
|
| 140 |
+
dtype: string
|
| 141 |
+
- name: ip_rep
|
| 142 |
+
dtype: string
|
| 143 |
+
- name: anomaly
|
| 144 |
+
dtype: string
|
| 145 |
+
- name: lang
|
| 146 |
+
dtype: string
|
| 147 |
+
- name: app
|
| 148 |
+
dtype: string
|
| 149 |
+
- name: http
|
| 150 |
+
dtype: string
|
| 151 |
+
- name: fatt_rdp
|
| 152 |
+
dtype: string
|
| 153 |
+
- name: tls
|
| 154 |
+
dtype: string
|
| 155 |
+
- name: fileinfo
|
| 156 |
+
dtype: string
|
| 157 |
+
- name: reason
|
| 158 |
+
dtype: string
|
| 159 |
+
- name: raw_hits
|
| 160 |
+
dtype: string
|
| 161 |
+
- name: fatt_tls
|
| 162 |
+
dtype: string
|
| 163 |
+
- name: smtp
|
| 164 |
+
dtype: string
|
| 165 |
+
- name: smb
|
| 166 |
+
dtype: string
|
| 167 |
+
- name: files
|
| 168 |
+
dtype: string
|
| 169 |
+
- name: ftp
|
| 170 |
+
dtype: string
|
| 171 |
+
- name: fatt_http
|
| 172 |
+
dtype: string
|
| 173 |
+
- name: icmp_type
|
| 174 |
+
dtype: string
|
| 175 |
+
- name: icmp_code
|
| 176 |
+
dtype: string
|
| 177 |
+
- name: mqtt
|
| 178 |
+
dtype: string
|
| 179 |
+
- name: pgsql
|
| 180 |
+
dtype: string
|
| 181 |
+
- name: dcerpc
|
| 182 |
+
dtype: string
|
| 183 |
+
- name: app_proto_ts
|
| 184 |
+
dtype: string
|
| 185 |
+
- name: commands
|
| 186 |
+
dtype: string
|
| 187 |
+
splits:
|
| 188 |
+
- name: train
|
| 189 |
+
num_bytes: 145729370
|
| 190 |
+
num_examples: 29545
|
| 191 |
+
download_size: 145729370
|
| 192 |
+
dataset_size: 145729370
|
| 193 |
+
config_name: default
|
| 194 |
+
---
|
| 195 |
+
|
| 196 |
+
# network-intrusion-detection
|
| 197 |
+
|
| 198 |
+
## Dataset Description
|
| 199 |
+
|
| 200 |
+
This dataset contains cybersecurity events collected from honeypot infrastructure.
|
| 201 |
+
|
| 202 |
+
The data has been processed and feature-engineered for machine learning applications in threat detection and security analytics.
|
| 203 |
+
|
| 204 |
+
## Feature Categories
|
| 205 |
+
|
| 206 |
+
### Network Features
|
| 207 |
+
- Connection flow statistics (bytes, packets, duration)
|
| 208 |
+
- Protocol-specific metrics
|
| 209 |
+
- Geographic information
|
| 210 |
+
- IP reputation data
|
| 211 |
+
|
| 212 |
+
### Behavioral Features
|
| 213 |
+
- Session patterns and command sequences
|
| 214 |
+
- User-agent analysis
|
| 215 |
+
- Attack pattern identification
|
| 216 |
+
- Protocol fingerprinting
|
| 217 |
+
|
| 218 |
+
### Temporal Features
|
| 219 |
+
- Time-based aggregations
|
| 220 |
+
- Frequency analysis
|
| 221 |
+
- Campaign detection indicators
|
| 222 |
+
- Attack timing patterns
|
| 223 |
+
|
| 224 |
+
### Security Labels
|
| 225 |
+
- MITRE ATT&CK technique mappings
|
| 226 |
+
- Alert severity classifications
|
| 227 |
+
- Automatic threat categorization
|
| 228 |
+
- Binary maliciousness indicators
|
| 229 |
+
|
| 230 |
+
## Usage Example
|
| 231 |
+
|
| 232 |
+
```python
|
| 233 |
+
from datasets import load_dataset
|
| 234 |
+
|
| 235 |
+
# Load the dataset
|
| 236 |
+
dataset = load_dataset("pyToshka/network-intrusion-detection")
|
| 237 |
+
train_data = dataset["train"]
|
| 238 |
+
|
| 239 |
+
# Basic exploration
|
| 240 |
+
print("Dataset features:", list(train_data.features.keys()))
|
| 241 |
+
print("Total samples:", len(train_data))
|
| 242 |
+
|
| 243 |
+
from collections import Counter
|
| 244 |
+
|
| 245 |
+
# Example: Filter RDP attacks
|
| 246 |
+
rdp_events = train_data.filter(lambda x: x['app_proto'] == 'rdp')
|
| 247 |
+
print("RDP events:", len(rdp_events))
|
| 248 |
+
|
| 249 |
+
# Example: Analyze attack vectors
|
| 250 |
+
if len(rdp_events) > 0:
|
| 251 |
+
attack_vectors = Counter([event['attack_vectors'] for event in rdp_events if event['attack_vectors']])
|
| 252 |
+
print("RDP Attack vectors:")
|
| 253 |
+
for vector, count in attack_vectors.most_common():
|
| 254 |
+
print(f" {vector}: {count}")
|
| 255 |
+
|
| 256 |
+
# Example: Analyze protocol distribution
|
| 257 |
+
protocols = Counter([event['app_proto'] for event in train_data if event['app_proto']])
|
| 258 |
+
print("Protocol distribution:")
|
| 259 |
+
for proto, count in protocols.most_common():
|
| 260 |
+
print(f" {proto if proto else '(empty)'}: {count}")
|
| 261 |
+
|
| 262 |
+
# Example: Malicious events analysis
|
| 263 |
+
malicious_count = sum(1 for event in train_data if event['is_malicious'])
|
| 264 |
+
print(f"Malicious events: {malicious_count}/{len(train_data)} ({malicious_count/len(train_data)*100:.1f}%)")
|
| 265 |
+
```
|
| 266 |
+
|
| 267 |
+
## Data Fields
|
| 268 |
+
|
| 269 |
+
The dataset contains 77 features across several categories:
|
| 270 |
+
|
| 271 |
+
### Network Features
|
| 272 |
+
- `dest_ip`: Network-related information
|
| 273 |
+
- `src_ip`: Network-related information
|
| 274 |
+
- `dest_port`: Network-related information
|
| 275 |
+
- `geoip_ext`: Network-related information
|
| 276 |
+
- `honeypot_ip_int`: Network-related information
|
| 277 |
+
- ... and 7 more network features
|
| 278 |
+
|
| 279 |
+
### Behavioral Features
|
| 280 |
+
- `commands`: Behavioral analysis data
|
| 281 |
+
|
| 282 |
+
### Temporal Features
|
| 283 |
+
- `@timestamp`: Time-based information
|
| 284 |
+
- `timestamp`: Time-based information
|
| 285 |
+
- `uptime`: Time-based information
|
| 286 |
+
|
| 287 |
+
### Security Features
|
| 288 |
+
- `alert`: Security and threat intelligence
|
| 289 |
+
- `mitre_techniques`: Security and threat intelligence
|
| 290 |
+
- `attack_vectors`: Security and threat intelligence
|
| 291 |
+
- `mitre_tactic`: Security and threat intelligence
|
| 292 |
+
- `mitre_technique`: Security and threat intelligence
|
| 293 |
+
- ... and 1 more security features
|
| 294 |
+
|
| 295 |
+
## Data Splits
|
| 296 |
+
|
| 297 |
+
| Split | Examples |
|
| 298 |
+
|-------|----------|
|
| 299 |
+
| train | 29,545 |
|
| 300 |
+
|
| 301 |
+
## Dataset Statistics
|
| 302 |
+
|
| 303 |
+
- **Total size**: ~139.0 MB
|
| 304 |
+
- **Average record size**: ~4932 bytes
|
| 305 |
+
- **Feature completeness**: 100.0%
|
| 306 |
+
|
| 307 |
+
## Ethical Considerations
|
| 308 |
+
|
| 309 |
+
This dataset contains real honeypot data representing actual attack attempts. Users should:
|
| 310 |
+
|
| 311 |
+
- **Privacy**: Respect anonymization measures implemented in the dataset
|
| 312 |
+
- **Research Use**: Use data only for legitimate cybersecurity research and education
|
| 313 |
+
- **Responsible Disclosure**: Follow responsible disclosure practices for any findings
|
| 314 |
+
- **Legal Compliance**: Comply with applicable laws and regulations in your jurisdiction
|
| 315 |
+
- **No Reidentification**: Do not attempt to identify or contact attackers
|
| 316 |
+
- **Defensive Purpose**: Use insights for defensive security improvements only
|
| 317 |
+
|
| 318 |
+
|
data_files.json
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"train": {
|
| 3 |
+
"csv": "train.csv",
|
| 4 |
+
"parquet": "train.parquet",
|
| 5 |
+
"jsonl": "train.jsonl"
|
| 6 |
+
}
|
| 7 |
+
}
|
metadata.json
ADDED
|
@@ -0,0 +1,262 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"dataset_info": {
|
| 3 |
+
"name": "network-intrusion-detection",
|
| 4 |
+
"version": "1.0.0",
|
| 5 |
+
"description": "Cybersecurity dataset from honeypot infrastructure",
|
| 6 |
+
"total_samples": 29545,
|
| 7 |
+
"features": 77,
|
| 8 |
+
"creation_timestamp": "2025-09-22T16:35:07.148369+00:00",
|
| 9 |
+
"data_source": "Honeypot Infrastructure",
|
| 10 |
+
"honeypot_types": {},
|
| 11 |
+
"time_range": {
|
| 12 |
+
"start": "",
|
| 13 |
+
"end": "2025-09-22T16:33:45.474857+00:00"
|
| 14 |
+
}
|
| 15 |
+
},
|
| 16 |
+
"statistics": {
|
| 17 |
+
"total_events": 40000,
|
| 18 |
+
"successful_extractions": 40000,
|
| 19 |
+
"feature_extraction_time": 68.711894,
|
| 20 |
+
"dataset_creation_time": 0,
|
| 21 |
+
"quality_score": 0.0
|
| 22 |
+
},
|
| 23 |
+
"feature_schema": {
|
| 24 |
+
"payload": "object",
|
| 25 |
+
"dest_ip": "object",
|
| 26 |
+
"metadata": "object",
|
| 27 |
+
"src_ip": "object",
|
| 28 |
+
"@timestamp": "object",
|
| 29 |
+
"honeypot_hostname": "object",
|
| 30 |
+
"dest_port": "int64",
|
| 31 |
+
"in_iface": "object",
|
| 32 |
+
"pkt_src": "object",
|
| 33 |
+
"geoip_ext": "object",
|
| 34 |
+
"proto": "object",
|
| 35 |
+
"honeypot_ip_int": "object",
|
| 36 |
+
"event_type": "object",
|
| 37 |
+
"alert": "object",
|
| 38 |
+
"direction": "object",
|
| 39 |
+
"geoip": "object",
|
| 40 |
+
"host": "object",
|
| 41 |
+
"type": "object",
|
| 42 |
+
"payload_printable": "object",
|
| 43 |
+
"@version": "object",
|
| 44 |
+
"flow": "object",
|
| 45 |
+
"src_port": "object",
|
| 46 |
+
"honeypot_ip_ext": "object",
|
| 47 |
+
"stream": "object",
|
| 48 |
+
"flow_id": "object",
|
| 49 |
+
"timestamp": "object",
|
| 50 |
+
"mitre_techniques": "object",
|
| 51 |
+
"attack_vectors": "object",
|
| 52 |
+
"mitre_tactic": "object",
|
| 53 |
+
"mitre_technique": "object",
|
| 54 |
+
"confidence_score": "object",
|
| 55 |
+
"is_malicious": "bool",
|
| 56 |
+
"severity": "object",
|
| 57 |
+
"primary_label": "object",
|
| 58 |
+
"subject": "object",
|
| 59 |
+
"os": "object",
|
| 60 |
+
"dist": "object",
|
| 61 |
+
"mod": "object",
|
| 62 |
+
"params": "object",
|
| 63 |
+
"raw_sig": "object",
|
| 64 |
+
"rdp": "object",
|
| 65 |
+
"tags": "object",
|
| 66 |
+
"app_proto": "object",
|
| 67 |
+
"tx_guessed": "object",
|
| 68 |
+
"tx_id": "object",
|
| 69 |
+
"fatt_ssh": "object",
|
| 70 |
+
"protocol": "object",
|
| 71 |
+
"link": "object",
|
| 72 |
+
"raw_mtu": "object",
|
| 73 |
+
"ssh": "object",
|
| 74 |
+
"app_proto_tc": "object",
|
| 75 |
+
"tcp": "object",
|
| 76 |
+
"uptime": "object",
|
| 77 |
+
"raw_freq": "object",
|
| 78 |
+
"ip_rep": "object",
|
| 79 |
+
"anomaly": "object",
|
| 80 |
+
"lang": "object",
|
| 81 |
+
"app": "object",
|
| 82 |
+
"http": "object",
|
| 83 |
+
"fatt_rdp": "object",
|
| 84 |
+
"tls": "object",
|
| 85 |
+
"fileinfo": "object",
|
| 86 |
+
"reason": "object",
|
| 87 |
+
"raw_hits": "object",
|
| 88 |
+
"fatt_tls": "object",
|
| 89 |
+
"smtp": "object",
|
| 90 |
+
"smb": "object",
|
| 91 |
+
"files": "object",
|
| 92 |
+
"ftp": "object",
|
| 93 |
+
"fatt_http": "object",
|
| 94 |
+
"icmp_type": "object",
|
| 95 |
+
"icmp_code": "object",
|
| 96 |
+
"mqtt": "object",
|
| 97 |
+
"pgsql": "object",
|
| 98 |
+
"dcerpc": "object",
|
| 99 |
+
"app_proto_ts": "object",
|
| 100 |
+
"commands": "object"
|
| 101 |
+
},
|
| 102 |
+
"quality_metrics": {
|
| 103 |
+
"completeness": {
|
| 104 |
+
"payload": 1.0,
|
| 105 |
+
"dest_ip": 1.0,
|
| 106 |
+
"metadata": 1.0,
|
| 107 |
+
"src_ip": 1.0,
|
| 108 |
+
"@timestamp": 1.0,
|
| 109 |
+
"honeypot_hostname": 1.0,
|
| 110 |
+
"dest_port": 1.0,
|
| 111 |
+
"in_iface": 1.0,
|
| 112 |
+
"pkt_src": 1.0,
|
| 113 |
+
"geoip_ext": 1.0,
|
| 114 |
+
"proto": 1.0,
|
| 115 |
+
"honeypot_ip_int": 1.0,
|
| 116 |
+
"event_type": 1.0,
|
| 117 |
+
"alert": 1.0,
|
| 118 |
+
"direction": 1.0,
|
| 119 |
+
"geoip": 1.0,
|
| 120 |
+
"host": 1.0,
|
| 121 |
+
"type": 1.0,
|
| 122 |
+
"payload_printable": 1.0,
|
| 123 |
+
"@version": 1.0,
|
| 124 |
+
"flow": 1.0,
|
| 125 |
+
"src_port": 1.0,
|
| 126 |
+
"honeypot_ip_ext": 1.0,
|
| 127 |
+
"stream": 1.0,
|
| 128 |
+
"flow_id": 1.0,
|
| 129 |
+
"timestamp": 1.0,
|
| 130 |
+
"mitre_techniques": 1.0,
|
| 131 |
+
"attack_vectors": 1.0,
|
| 132 |
+
"mitre_tactic": 1.0,
|
| 133 |
+
"mitre_technique": 1.0,
|
| 134 |
+
"confidence_score": 1.0,
|
| 135 |
+
"is_malicious": 1.0,
|
| 136 |
+
"severity": 1.0,
|
| 137 |
+
"primary_label": 1.0,
|
| 138 |
+
"subject": 1.0,
|
| 139 |
+
"os": 1.0,
|
| 140 |
+
"dist": 1.0,
|
| 141 |
+
"mod": 1.0,
|
| 142 |
+
"params": 1.0,
|
| 143 |
+
"raw_sig": 1.0,
|
| 144 |
+
"rdp": 1.0,
|
| 145 |
+
"tags": 1.0,
|
| 146 |
+
"app_proto": 1.0,
|
| 147 |
+
"tx_guessed": 1.0,
|
| 148 |
+
"tx_id": 1.0,
|
| 149 |
+
"fatt_ssh": 1.0,
|
| 150 |
+
"protocol": 1.0,
|
| 151 |
+
"link": 1.0,
|
| 152 |
+
"raw_mtu": 1.0,
|
| 153 |
+
"ssh": 1.0,
|
| 154 |
+
"app_proto_tc": 1.0,
|
| 155 |
+
"tcp": 1.0,
|
| 156 |
+
"uptime": 1.0,
|
| 157 |
+
"raw_freq": 1.0,
|
| 158 |
+
"ip_rep": 1.0,
|
| 159 |
+
"anomaly": 1.0,
|
| 160 |
+
"lang": 1.0,
|
| 161 |
+
"app": 1.0,
|
| 162 |
+
"http": 1.0,
|
| 163 |
+
"fatt_rdp": 1.0,
|
| 164 |
+
"tls": 1.0,
|
| 165 |
+
"fileinfo": 1.0,
|
| 166 |
+
"reason": 1.0,
|
| 167 |
+
"raw_hits": 1.0,
|
| 168 |
+
"fatt_tls": 1.0,
|
| 169 |
+
"smtp": 1.0,
|
| 170 |
+
"smb": 1.0,
|
| 171 |
+
"files": 1.0,
|
| 172 |
+
"ftp": 1.0,
|
| 173 |
+
"fatt_http": 1.0,
|
| 174 |
+
"icmp_type": 1.0,
|
| 175 |
+
"icmp_code": 1.0,
|
| 176 |
+
"mqtt": 1.0,
|
| 177 |
+
"pgsql": 1.0,
|
| 178 |
+
"dcerpc": 1.0,
|
| 179 |
+
"app_proto_ts": 1.0,
|
| 180 |
+
"commands": 1.0
|
| 181 |
+
},
|
| 182 |
+
"uniqueness": {
|
| 183 |
+
"payload": 0.007886275173464206,
|
| 184 |
+
"dest_ip": 3.384667456422407e-05,
|
| 185 |
+
"metadata": 0.0013200203080047386,
|
| 186 |
+
"src_ip": 0.025351159248603823,
|
| 187 |
+
"@timestamp": 0.3710610932475884,
|
| 188 |
+
"honeypot_hostname": 0.010120155694702995,
|
| 189 |
+
"dest_port": 0.0488069047216111,
|
| 190 |
+
"in_iface": 6.769334912844813e-05,
|
| 191 |
+
"pkt_src": 0.00013538669825689627,
|
| 192 |
+
"geoip_ext": 0.0007446268404129294,
|
| 193 |
+
"proto": 0.0001015400236926722,
|
| 194 |
+
"honeypot_ip_int": 0.7991538331358944,
|
| 195 |
+
"event_type": 0.000507700118463361,
|
| 196 |
+
"alert": 0.012117109493992216,
|
| 197 |
+
"direction": 0.0001015400236926722,
|
| 198 |
+
"geoip": 0.047486884413606364,
|
| 199 |
+
"host": 0.010120155694702995,
|
| 200 |
+
"type": 0.0001015400236926722,
|
| 201 |
+
"payload_printable": 0.007886275173464206,
|
| 202 |
+
"@version": 3.384667456422407e-05,
|
| 203 |
+
"flow": 0.23344051446945338,
|
| 204 |
+
"src_port": 0.1540362159417837,
|
| 205 |
+
"honeypot_ip_ext": 3.384667456422407e-05,
|
| 206 |
+
"stream": 0.0001015400236926722,
|
| 207 |
+
"flow_id": 0.16865797935352853,
|
| 208 |
+
"timestamp": 0.3551193095278389,
|
| 209 |
+
"mitre_techniques": 3.384667456422407e-05,
|
| 210 |
+
"attack_vectors": 3.384667456422407e-05,
|
| 211 |
+
"mitre_tactic": 3.384667456422407e-05,
|
| 212 |
+
"mitre_technique": 3.384667456422407e-05,
|
| 213 |
+
"confidence_score": 3.384667456422407e-05,
|
| 214 |
+
"is_malicious": 3.384667456422407e-05,
|
| 215 |
+
"severity": 3.384667456422407e-05,
|
| 216 |
+
"primary_label": 6.769334912844813e-05,
|
| 217 |
+
"subject": 0.0001015400236926722,
|
| 218 |
+
"os": 0.000507700118463361,
|
| 219 |
+
"dist": 0.0009138602132340497,
|
| 220 |
+
"mod": 0.0003046200710780166,
|
| 221 |
+
"params": 0.00023692672194956845,
|
| 222 |
+
"raw_sig": 0.012015569470299543,
|
| 223 |
+
"rdp": 0.0005753934675918091,
|
| 224 |
+
"tags": 6.769334912844813e-05,
|
| 225 |
+
"app_proto": 0.00044000676933491283,
|
| 226 |
+
"tx_guessed": 6.769334912844813e-05,
|
| 227 |
+
"tx_id": 0.00016923337282112033,
|
| 228 |
+
"fatt_ssh": 0.0012861736334405145,
|
| 229 |
+
"protocol": 0.00016923337282112033,
|
| 230 |
+
"link": 0.0003046200710780166,
|
| 231 |
+
"raw_mtu": 0.0007107801658487054,
|
| 232 |
+
"ssh": 0.0013200203080047386,
|
| 233 |
+
"app_proto_tc": 0.00016923337282112033,
|
| 234 |
+
"tcp": 0.012286342866813335,
|
| 235 |
+
"uptime": 0.019969537992892198,
|
| 236 |
+
"raw_freq": 0.017871044169910307,
|
| 237 |
+
"ip_rep": 0.00013538669825689627,
|
| 238 |
+
"anomaly": 0.00016923337282112033,
|
| 239 |
+
"lang": 0.00013538669825689627,
|
| 240 |
+
"app": 0.00013538669825689627,
|
| 241 |
+
"http": 0.007040108309358605,
|
| 242 |
+
"fatt_rdp": 0.0001015400236926722,
|
| 243 |
+
"tls": 0.0011507869351836183,
|
| 244 |
+
"fileinfo": 0.0002030800473853444,
|
| 245 |
+
"reason": 0.0007107801658487054,
|
| 246 |
+
"raw_hits": 0.0017261804027754273,
|
| 247 |
+
"fatt_tls": 0.001556947029954307,
|
| 248 |
+
"smtp": 6.769334912844813e-05,
|
| 249 |
+
"smb": 0.0008123201895413775,
|
| 250 |
+
"files": 0.0001015400236926722,
|
| 251 |
+
"ftp": 0.0002030800473853444,
|
| 252 |
+
"fatt_http": 0.0002030800473853444,
|
| 253 |
+
"icmp_type": 6.769334912844813e-05,
|
| 254 |
+
"icmp_code": 0.00013538669825689627,
|
| 255 |
+
"mqtt": 0.00013538669825689627,
|
| 256 |
+
"pgsql": 0.00013538669825689627,
|
| 257 |
+
"dcerpc": 6.769334912844813e-05,
|
| 258 |
+
"app_proto_ts": 6.769334912844813e-05,
|
| 259 |
+
"commands": 3.384667456422407e-05
|
| 260 |
+
}
|
| 261 |
+
}
|
| 262 |
+
}
|
train.csv
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:70c8e27c894702dd21c4b51708a7ad5a343a8af6a0da1529a632bfb22b0dc7cf
|
| 3 |
+
size 40921169
|
train.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0ce9197ac537d14096558061f6afcd2531a78411f35b030c4355efcf71c7c118
|
| 3 |
+
size 69431922
|
train.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b7e602e1b2d26b1a38c036e744181b1735e7550a4348d29a9319721d7d3f20f0
|
| 3 |
+
size 2140196
|
upload_manifest.json
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"upload_session_id": "upload_1758558909",
|
| 3 |
+
"preparation_timestamp": "2025-09-22T16:35:11.452405+00:00",
|
| 4 |
+
"source_path": "outputs/ml_pipeline/network-intrusion-detection",
|
| 5 |
+
"dataset_format": "huggingface",
|
| 6 |
+
"files_prepared": [
|
| 7 |
+
"train.jsonl",
|
| 8 |
+
"train.parquet",
|
| 9 |
+
"metadata.json",
|
| 10 |
+
"README.md",
|
| 11 |
+
"data_files.json",
|
| 12 |
+
"train.csv"
|
| 13 |
+
],
|
| 14 |
+
"total_size_bytes": 112508258
|
| 15 |
+
}
|