Che237 commited on
Commit
5156284
·
verified ·
1 Parent(s): 6fb6a4f

Upload web_security dataset

Browse files
web_security/android_malware_drebin/android_malware_drebin_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/cicids2017_ddos/cicids2017_ddos_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/cryptomining_scripts/cryptomining_scripts_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/dataset_metadata.json ADDED
@@ -0,0 +1,404 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "url_phishing_kaggle": {
3
+ "name": "Malicious vs Benign URLs (Kaggle)",
4
+ "description": "URLs classified as malicious or benign with extracted features",
5
+ "urls": [
6
+ "https://raw.githubusercontent.com/hex-plex/Malicious-URL-Classification/master/url_data.csv"
7
+ ],
8
+ "category": "phishing",
9
+ "samples": 450000,
10
+ "features": [
11
+ "url",
12
+ "url_length",
13
+ "hostname_length",
14
+ "path_length",
15
+ "fd_length",
16
+ "tld_count",
17
+ "params_count",
18
+ "fragment_count",
19
+ "suspicious_words",
20
+ "digits_ratio",
21
+ "special_chars_ratio",
22
+ "is_malicious"
23
+ ],
24
+ "target": "is_malicious",
25
+ "format": "csv",
26
+ "downloaded_at": "2026-01-29T16:35:00.496780",
27
+ "status": "available"
28
+ },
29
+ "phishing_websites_uci": {
30
+ "name": "UCI Phishing Websites Dataset",
31
+ "description": "30 features extracted from phishing and legitimate websites",
32
+ "urls": [
33
+ "https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv"
34
+ ],
35
+ "category": "phishing",
36
+ "samples": 11055,
37
+ "features": [
38
+ "having_ip",
39
+ "url_length",
40
+ "shortening_service",
41
+ "having_at",
42
+ "double_slash",
43
+ "prefix_suffix",
44
+ "sub_domain",
45
+ "ssl_final_state",
46
+ "domain_registration",
47
+ "favicon",
48
+ "port",
49
+ "https_token",
50
+ "result"
51
+ ],
52
+ "target": "result",
53
+ "format": "csv",
54
+ "downloaded_at": "2026-01-29T16:35:00.843897",
55
+ "status": "available"
56
+ },
57
+ "malware_pe_features": {
58
+ "name": "PE Header Malware Features",
59
+ "description": "Windows PE file features for malware classification",
60
+ "urls": [
61
+ "https://raw.githubusercontent.com/urwithajit9/ClaMP/master/dataset/malware.csv"
62
+ ],
63
+ "category": "malware",
64
+ "samples": 4500,
65
+ "features": [
66
+ "md5",
67
+ "file_size",
68
+ "e_lfanew",
69
+ "machine",
70
+ "sections",
71
+ "characteristics",
72
+ "timestamp",
73
+ "entry_point",
74
+ "image_base",
75
+ "subsystem",
76
+ "dll_characteristics",
77
+ "size_of_code",
78
+ "size_of_init_data",
79
+ "size_of_uninit_data",
80
+ "legitimate"
81
+ ],
82
+ "target": "legitimate",
83
+ "format": "csv",
84
+ "downloaded_at": "2026-01-29T16:35:01.006557",
85
+ "status": "available"
86
+ },
87
+ "android_malware_drebin": {
88
+ "name": "Android Malware (Drebin-style Features)",
89
+ "description": "Android app permission features for malware detection",
90
+ "urls": [
91
+ "https://raw.githubusercontent.com/cloudhubs/static-malware-analysis/main/Data/android_data.csv"
92
+ ],
93
+ "category": "malware",
94
+ "samples": 15000,
95
+ "features": [
96
+ "pkg_name",
97
+ "permissions",
98
+ "api_calls",
99
+ "intents",
100
+ "is_malware"
101
+ ],
102
+ "target": "is_malware",
103
+ "format": "csv",
104
+ "downloaded_at": "2026-01-29T16:35:01.484651",
105
+ "status": "available"
106
+ },
107
+ "cicids2017_ddos": {
108
+ "name": "CICIDS 2017 DDoS Detection",
109
+ "description": "Network flows with DDoS and benign traffic",
110
+ "urls": [
111
+ "https://raw.githubusercontent.com/AbdullahTarique/CICIDS-2017-Dataset/main/Sample/Friday-WorkingHours-Afternoon-DDos.csv"
112
+ ],
113
+ "category": "intrusion",
114
+ "samples": 128000,
115
+ "features": [
116
+ "flow_duration",
117
+ "total_fwd_packets",
118
+ "total_bwd_packets",
119
+ "flow_bytes_s",
120
+ "flow_packets_s",
121
+ "avg_packet_size",
122
+ "label"
123
+ ],
124
+ "target": "label",
125
+ "format": "csv",
126
+ "downloaded_at": "2026-01-29T16:35:01.913481",
127
+ "status": "available"
128
+ },
129
+ "nsl_kdd_train": {
130
+ "name": "NSL-KDD Network Intrusion",
131
+ "description": "Improved KDD Cup 99 dataset for network intrusion detection",
132
+ "urls": [
133
+ "https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.txt"
134
+ ],
135
+ "category": "intrusion",
136
+ "samples": 125973,
137
+ "features": [
138
+ "duration",
139
+ "protocol_type",
140
+ "service",
141
+ "flag",
142
+ "src_bytes",
143
+ "dst_bytes",
144
+ "land",
145
+ "wrong_fragment",
146
+ "urgent",
147
+ "hot",
148
+ "num_failed_logins",
149
+ "logged_in",
150
+ "num_compromised",
151
+ "attack_type"
152
+ ],
153
+ "target": "attack_type",
154
+ "format": "txt",
155
+ "downloaded_at": "2026-01-29T16:35:02.373654",
156
+ "status": "available"
157
+ },
158
+ "unsw_nb15": {
159
+ "name": "UNSW-NB15 Network Dataset",
160
+ "description": "Modern network intrusion dataset with 9 attack types",
161
+ "urls": [
162
+ "https://raw.githubusercontent.com/jmnwong/UNSW-NB15/master/UNSW-NB15_1.csv"
163
+ ],
164
+ "category": "intrusion",
165
+ "samples": 175000,
166
+ "features": [
167
+ "srcip",
168
+ "sport",
169
+ "dstip",
170
+ "dsport",
171
+ "proto",
172
+ "state",
173
+ "dur",
174
+ "sbytes",
175
+ "dbytes",
176
+ "sttl",
177
+ "dttl",
178
+ "attack_cat",
179
+ "label"
180
+ ],
181
+ "target": "label",
182
+ "format": "csv",
183
+ "downloaded_at": "2026-01-29T16:35:02.792570",
184
+ "status": "available"
185
+ },
186
+ "ipsum_malicious_ips": {
187
+ "name": "IPsum Malicious IPs",
188
+ "description": "Daily updated list of malicious IP addresses",
189
+ "urls": [
190
+ "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt"
191
+ ],
192
+ "category": "threat_intel",
193
+ "samples": 25000,
194
+ "features": [
195
+ "ip_address",
196
+ "threat_level"
197
+ ],
198
+ "target": "threat_level",
199
+ "format": "txt",
200
+ "downloaded_at": "2026-01-29T16:35:03.526227",
201
+ "status": "available"
202
+ },
203
+ "feodotracker_botnet": {
204
+ "name": "Feodo Tracker Botnet C2",
205
+ "description": "Botnet Command & Control server IPs",
206
+ "urls": [
207
+ "https://feodotracker.abuse.ch/downloads/ipblocklist.csv"
208
+ ],
209
+ "category": "threat_intel",
210
+ "samples": 5000,
211
+ "features": [
212
+ "first_seen",
213
+ "dst_ip",
214
+ "dst_port",
215
+ "malware",
216
+ "status"
217
+ ],
218
+ "target": "malware",
219
+ "format": "csv",
220
+ "downloaded_at": "2026-01-29T16:35:03.907662",
221
+ "status": "available"
222
+ },
223
+ "urlhaus_malicious": {
224
+ "name": "URLhaus Malicious URLs",
225
+ "description": "Database of malware distribution URLs",
226
+ "urls": [
227
+ "https://urlhaus.abuse.ch/downloads/csv_recent/"
228
+ ],
229
+ "category": "threat_intel",
230
+ "samples": 10000,
231
+ "features": [
232
+ "dateadded",
233
+ "url",
234
+ "url_status",
235
+ "threat",
236
+ "tags",
237
+ "urlhaus_link"
238
+ ],
239
+ "target": "threat",
240
+ "format": "csv",
241
+ "downloaded_at": "2026-01-29T16:35:04.832782",
242
+ "status": "available"
243
+ },
244
+ "spambase_uci": {
245
+ "name": "UCI Spambase",
246
+ "description": "Email spam classification with word frequencies",
247
+ "urls": [
248
+ "https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data"
249
+ ],
250
+ "category": "spam",
251
+ "samples": 4601,
252
+ "features": [
253
+ "word_freq_make",
254
+ "word_freq_address",
255
+ "word_freq_all",
256
+ "char_freq_semicolon",
257
+ "char_freq_dollar",
258
+ "capital_run_avg",
259
+ "capital_run_longest",
260
+ "capital_run_total",
261
+ "is_spam"
262
+ ],
263
+ "target": "is_spam",
264
+ "format": "data",
265
+ "downloaded_at": "2026-01-29T16:35:05.124845",
266
+ "status": "available"
267
+ },
268
+ "xss_payloads": {
269
+ "name": "XSS Attack Payloads",
270
+ "description": "Cross-site scripting attack patterns",
271
+ "urls": [
272
+ "https://raw.githubusercontent.com/payloadbox/xss-payload-list/master/Intruder/xss-payload-list.txt"
273
+ ],
274
+ "category": "web_attack",
275
+ "samples": 5000,
276
+ "features": [
277
+ "payload",
278
+ "type"
279
+ ],
280
+ "target": "type",
281
+ "format": "txt",
282
+ "downloaded_at": "2026-01-29T16:35:05.293648",
283
+ "status": "available"
284
+ },
285
+ "sql_injection_payloads": {
286
+ "name": "SQL Injection Payloads",
287
+ "description": "SQL injection attack patterns",
288
+ "urls": [
289
+ "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Auth-Bypass.txt",
290
+ "https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Error-Based.txt"
291
+ ],
292
+ "category": "web_attack",
293
+ "samples": 3000,
294
+ "features": [
295
+ "payload",
296
+ "injection_type"
297
+ ],
298
+ "target": "injection_type",
299
+ "format": "txt",
300
+ "downloaded_at": "2026-01-29T16:35:05.501629",
301
+ "status": "available"
302
+ },
303
+ "http_csic_requests": {
304
+ "name": "HTTP CSIC 2010 Dataset",
305
+ "description": "HTTP requests with web attacks (XSS, SQLi, etc.)",
306
+ "urls": [
307
+ "https://raw.githubusercontent.com/Morzeux/HttpRequestsDataset/master/csic_http/csic_2010_cleaned.csv"
308
+ ],
309
+ "category": "web_attack",
310
+ "samples": 36000,
311
+ "features": [
312
+ "method",
313
+ "url",
314
+ "protocol",
315
+ "content",
316
+ "is_attack"
317
+ ],
318
+ "target": "is_attack",
319
+ "format": "csv",
320
+ "downloaded_at": "2026-01-29T16:35:05.724490",
321
+ "status": "available"
322
+ },
323
+ "cryptomining_scripts": {
324
+ "name": "Cryptomining Script Detection",
325
+ "description": "JavaScript cryptomining patterns",
326
+ "urls": [
327
+ "https://raw.githubusercontent.com/ArslanKhan-cs/JSMiner/main/data/cryptominer.csv"
328
+ ],
329
+ "category": "cryptomining",
330
+ "samples": 5000,
331
+ "features": [
332
+ "script_hash",
333
+ "obfuscated",
334
+ "api_calls",
335
+ "is_miner"
336
+ ],
337
+ "target": "is_miner",
338
+ "format": "csv",
339
+ "downloaded_at": "2026-01-29T16:35:05.924379",
340
+ "status": "available"
341
+ },
342
+ "dga_domains": {
343
+ "name": "DGA Domain Detection",
344
+ "description": "Domain Generation Algorithm detection dataset",
345
+ "urls": [
346
+ "https://raw.githubusercontent.com/baderj/domain_generation_algorithms/master/dga_db/export/dga_domains_sample.csv"
347
+ ],
348
+ "category": "dns",
349
+ "samples": 50000,
350
+ "features": [
351
+ "domain",
352
+ "family",
353
+ "length",
354
+ "entropy",
355
+ "consonant_ratio",
356
+ "is_dga"
357
+ ],
358
+ "target": "is_dga",
359
+ "format": "csv",
360
+ "downloaded_at": "2026-01-29T16:35:06.692993",
361
+ "status": "available"
362
+ },
363
+ "ssl_certificates": {
364
+ "name": "SSL Certificate Analysis",
365
+ "description": "SSL certificate features for malicious detection",
366
+ "urls": [
367
+ "https://raw.githubusercontent.com/JustinGuese/ML-Security-SSL-Phishing/master/data/SSL-phishing.csv"
368
+ ],
369
+ "category": "ssl",
370
+ "samples": 8000,
371
+ "features": [
372
+ "cert_issuer",
373
+ "cert_validity",
374
+ "domain_match",
375
+ "is_ev",
376
+ "cipher_strength",
377
+ "is_phishing"
378
+ ],
379
+ "target": "is_phishing",
380
+ "format": "csv",
381
+ "downloaded_at": "2026-01-29T16:35:06.841582",
382
+ "status": "available"
383
+ },
384
+ "system_logs_hdfs": {
385
+ "name": "HDFS System Logs",
386
+ "description": "Hadoop system logs for anomaly detection",
387
+ "urls": [
388
+ "https://raw.githubusercontent.com/logpai/loghub/master/HDFS/HDFS.log_structured.csv"
389
+ ],
390
+ "category": "logs",
391
+ "samples": 11000,
392
+ "features": [
393
+ "timestamp",
394
+ "level",
395
+ "component",
396
+ "content",
397
+ "event_template"
398
+ ],
399
+ "target": "level",
400
+ "format": "csv",
401
+ "downloaded_at": "2026-01-29T16:35:07.926689",
402
+ "status": "available"
403
+ }
404
+ }
web_security/dga_domains/dga_domains_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/feodotracker_botnet/feodotracker_botnet_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/http_csic_requests/http_csic_requests_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/ipsum_malicious_ips/ipsum_malicious_ips_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/malware_pe_features/malware_pe_features_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/nsl_kdd_train/nsl_kdd_train_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/phishing_websites_uci/phishing_websites_uci_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/spambase_uci/spambase_uci_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/sql_injection_payloads/sql_injection_payloads_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/ssl_certificates/ssl_certificates_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/system_logs_hdfs/system_logs_hdfs_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/unsw_nb15/unsw_nb15_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/url_phishing_kaggle/url_phishing_kaggle_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/urlhaus_malicious/urlhaus_malicious_processed.csv ADDED
The diff for this file is too large to render. See raw diff
 
web_security/xss_payloads/xss_payloads_processed.csv ADDED
The diff for this file is too large to render. See raw diff