--- language: - en task_categories: - other task_ids: - tabular-multi-class-classification - multi-class-classification pretty_name: Honeypot Cybersecurity Dataset size_categories: - 10K 0: attack_vectors = Counter([event['attack_vectors'] for event in rdp_events if event['attack_vectors']]) print("RDP Attack vectors:") for vector, count in attack_vectors.most_common(): print(f" {vector}: {count}") # Example: Analyze protocol distribution protocols = Counter([event['app_proto'] for event in train_data if event['app_proto']]) print("Protocol distribution:") for proto, count in protocols.most_common(): print(f" {proto if proto else '(empty)'}: {count}") # Example: Malicious events analysis malicious_count = sum(1 for event in train_data if event['is_malicious']) print(f"Malicious events: {malicious_count}/{len(train_data)} ({malicious_count/len(train_data)*100:.1f}%)") ``` ## Data Fields The dataset contains 77 features across several categories: ### Network Features - `dest_ip`: Network-related information - `src_ip`: Network-related information - `dest_port`: Network-related information - `geoip_ext`: Network-related information - `honeypot_ip_int`: Network-related information - ... and 7 more network features ### Behavioral Features - `commands`: Behavioral analysis data ### Temporal Features - `@timestamp`: Time-based information - `timestamp`: Time-based information - `uptime`: Time-based information ### Security Features - `alert`: Security and threat intelligence - `mitre_techniques`: Security and threat intelligence - `attack_vectors`: Security and threat intelligence - `mitre_tactic`: Security and threat intelligence - `mitre_technique`: Security and threat intelligence - ... and 1 more security features ## Data Splits | Split | Examples | |-------|----------| | train | 29,545 | ## Dataset Statistics - **Total size**: ~139.0 MB - **Average record size**: ~4932 bytes - **Feature completeness**: 100.0% ## Ethical Considerations This dataset contains real honeypot data representing actual attack attempts. Users should: - **Privacy**: Respect anonymization measures implemented in the dataset - **Research Use**: Use data only for legitimate cybersecurity research and education - **Responsible Disclosure**: Follow responsible disclosure practices for any findings - **Legal Compliance**: Comply with applicable laws and regulations in your jurisdiction - **No Reidentification**: Do not attempt to identify or contact attackers - **Defensive Purpose**: Use insights for defensive security improvements only