Upload web_security dataset
Browse files- web_security/android_malware_drebin/android_malware_drebin_processed.csv +0 -0
- web_security/cicids2017_ddos/cicids2017_ddos_processed.csv +0 -0
- web_security/cryptomining_scripts/cryptomining_scripts_processed.csv +0 -0
- web_security/dataset_metadata.json +404 -0
- web_security/dga_domains/dga_domains_processed.csv +0 -0
- web_security/feodotracker_botnet/feodotracker_botnet_processed.csv +0 -0
- web_security/http_csic_requests/http_csic_requests_processed.csv +0 -0
- web_security/ipsum_malicious_ips/ipsum_malicious_ips_processed.csv +0 -0
- web_security/malware_pe_features/malware_pe_features_processed.csv +0 -0
- web_security/nsl_kdd_train/nsl_kdd_train_processed.csv +0 -0
- web_security/phishing_websites_uci/phishing_websites_uci_processed.csv +0 -0
- web_security/spambase_uci/spambase_uci_processed.csv +0 -0
- web_security/sql_injection_payloads/sql_injection_payloads_processed.csv +0 -0
- web_security/ssl_certificates/ssl_certificates_processed.csv +0 -0
- web_security/system_logs_hdfs/system_logs_hdfs_processed.csv +0 -0
- web_security/unsw_nb15/unsw_nb15_processed.csv +0 -0
- web_security/url_phishing_kaggle/url_phishing_kaggle_processed.csv +0 -0
- web_security/urlhaus_malicious/urlhaus_malicious_processed.csv +0 -0
- web_security/xss_payloads/xss_payloads_processed.csv +0 -0
web_security/android_malware_drebin/android_malware_drebin_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/cicids2017_ddos/cicids2017_ddos_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/cryptomining_scripts/cryptomining_scripts_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/dataset_metadata.json
ADDED
|
@@ -0,0 +1,404 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"url_phishing_kaggle": {
|
| 3 |
+
"name": "Malicious vs Benign URLs (Kaggle)",
|
| 4 |
+
"description": "URLs classified as malicious or benign with extracted features",
|
| 5 |
+
"urls": [
|
| 6 |
+
"https://raw.githubusercontent.com/hex-plex/Malicious-URL-Classification/master/url_data.csv"
|
| 7 |
+
],
|
| 8 |
+
"category": "phishing",
|
| 9 |
+
"samples": 450000,
|
| 10 |
+
"features": [
|
| 11 |
+
"url",
|
| 12 |
+
"url_length",
|
| 13 |
+
"hostname_length",
|
| 14 |
+
"path_length",
|
| 15 |
+
"fd_length",
|
| 16 |
+
"tld_count",
|
| 17 |
+
"params_count",
|
| 18 |
+
"fragment_count",
|
| 19 |
+
"suspicious_words",
|
| 20 |
+
"digits_ratio",
|
| 21 |
+
"special_chars_ratio",
|
| 22 |
+
"is_malicious"
|
| 23 |
+
],
|
| 24 |
+
"target": "is_malicious",
|
| 25 |
+
"format": "csv",
|
| 26 |
+
"downloaded_at": "2026-01-29T16:35:00.496780",
|
| 27 |
+
"status": "available"
|
| 28 |
+
},
|
| 29 |
+
"phishing_websites_uci": {
|
| 30 |
+
"name": "UCI Phishing Websites Dataset",
|
| 31 |
+
"description": "30 features extracted from phishing and legitimate websites",
|
| 32 |
+
"urls": [
|
| 33 |
+
"https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv"
|
| 34 |
+
],
|
| 35 |
+
"category": "phishing",
|
| 36 |
+
"samples": 11055,
|
| 37 |
+
"features": [
|
| 38 |
+
"having_ip",
|
| 39 |
+
"url_length",
|
| 40 |
+
"shortening_service",
|
| 41 |
+
"having_at",
|
| 42 |
+
"double_slash",
|
| 43 |
+
"prefix_suffix",
|
| 44 |
+
"sub_domain",
|
| 45 |
+
"ssl_final_state",
|
| 46 |
+
"domain_registration",
|
| 47 |
+
"favicon",
|
| 48 |
+
"port",
|
| 49 |
+
"https_token",
|
| 50 |
+
"result"
|
| 51 |
+
],
|
| 52 |
+
"target": "result",
|
| 53 |
+
"format": "csv",
|
| 54 |
+
"downloaded_at": "2026-01-29T16:35:00.843897",
|
| 55 |
+
"status": "available"
|
| 56 |
+
},
|
| 57 |
+
"malware_pe_features": {
|
| 58 |
+
"name": "PE Header Malware Features",
|
| 59 |
+
"description": "Windows PE file features for malware classification",
|
| 60 |
+
"urls": [
|
| 61 |
+
"https://raw.githubusercontent.com/urwithajit9/ClaMP/master/dataset/malware.csv"
|
| 62 |
+
],
|
| 63 |
+
"category": "malware",
|
| 64 |
+
"samples": 4500,
|
| 65 |
+
"features": [
|
| 66 |
+
"md5",
|
| 67 |
+
"file_size",
|
| 68 |
+
"e_lfanew",
|
| 69 |
+
"machine",
|
| 70 |
+
"sections",
|
| 71 |
+
"characteristics",
|
| 72 |
+
"timestamp",
|
| 73 |
+
"entry_point",
|
| 74 |
+
"image_base",
|
| 75 |
+
"subsystem",
|
| 76 |
+
"dll_characteristics",
|
| 77 |
+
"size_of_code",
|
| 78 |
+
"size_of_init_data",
|
| 79 |
+
"size_of_uninit_data",
|
| 80 |
+
"legitimate"
|
| 81 |
+
],
|
| 82 |
+
"target": "legitimate",
|
| 83 |
+
"format": "csv",
|
| 84 |
+
"downloaded_at": "2026-01-29T16:35:01.006557",
|
| 85 |
+
"status": "available"
|
| 86 |
+
},
|
| 87 |
+
"android_malware_drebin": {
|
| 88 |
+
"name": "Android Malware (Drebin-style Features)",
|
| 89 |
+
"description": "Android app permission features for malware detection",
|
| 90 |
+
"urls": [
|
| 91 |
+
"https://raw.githubusercontent.com/cloudhubs/static-malware-analysis/main/Data/android_data.csv"
|
| 92 |
+
],
|
| 93 |
+
"category": "malware",
|
| 94 |
+
"samples": 15000,
|
| 95 |
+
"features": [
|
| 96 |
+
"pkg_name",
|
| 97 |
+
"permissions",
|
| 98 |
+
"api_calls",
|
| 99 |
+
"intents",
|
| 100 |
+
"is_malware"
|
| 101 |
+
],
|
| 102 |
+
"target": "is_malware",
|
| 103 |
+
"format": "csv",
|
| 104 |
+
"downloaded_at": "2026-01-29T16:35:01.484651",
|
| 105 |
+
"status": "available"
|
| 106 |
+
},
|
| 107 |
+
"cicids2017_ddos": {
|
| 108 |
+
"name": "CICIDS 2017 DDoS Detection",
|
| 109 |
+
"description": "Network flows with DDoS and benign traffic",
|
| 110 |
+
"urls": [
|
| 111 |
+
"https://raw.githubusercontent.com/AbdullahTarique/CICIDS-2017-Dataset/main/Sample/Friday-WorkingHours-Afternoon-DDos.csv"
|
| 112 |
+
],
|
| 113 |
+
"category": "intrusion",
|
| 114 |
+
"samples": 128000,
|
| 115 |
+
"features": [
|
| 116 |
+
"flow_duration",
|
| 117 |
+
"total_fwd_packets",
|
| 118 |
+
"total_bwd_packets",
|
| 119 |
+
"flow_bytes_s",
|
| 120 |
+
"flow_packets_s",
|
| 121 |
+
"avg_packet_size",
|
| 122 |
+
"label"
|
| 123 |
+
],
|
| 124 |
+
"target": "label",
|
| 125 |
+
"format": "csv",
|
| 126 |
+
"downloaded_at": "2026-01-29T16:35:01.913481",
|
| 127 |
+
"status": "available"
|
| 128 |
+
},
|
| 129 |
+
"nsl_kdd_train": {
|
| 130 |
+
"name": "NSL-KDD Network Intrusion",
|
| 131 |
+
"description": "Improved KDD Cup 99 dataset for network intrusion detection",
|
| 132 |
+
"urls": [
|
| 133 |
+
"https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.txt"
|
| 134 |
+
],
|
| 135 |
+
"category": "intrusion",
|
| 136 |
+
"samples": 125973,
|
| 137 |
+
"features": [
|
| 138 |
+
"duration",
|
| 139 |
+
"protocol_type",
|
| 140 |
+
"service",
|
| 141 |
+
"flag",
|
| 142 |
+
"src_bytes",
|
| 143 |
+
"dst_bytes",
|
| 144 |
+
"land",
|
| 145 |
+
"wrong_fragment",
|
| 146 |
+
"urgent",
|
| 147 |
+
"hot",
|
| 148 |
+
"num_failed_logins",
|
| 149 |
+
"logged_in",
|
| 150 |
+
"num_compromised",
|
| 151 |
+
"attack_type"
|
| 152 |
+
],
|
| 153 |
+
"target": "attack_type",
|
| 154 |
+
"format": "txt",
|
| 155 |
+
"downloaded_at": "2026-01-29T16:35:02.373654",
|
| 156 |
+
"status": "available"
|
| 157 |
+
},
|
| 158 |
+
"unsw_nb15": {
|
| 159 |
+
"name": "UNSW-NB15 Network Dataset",
|
| 160 |
+
"description": "Modern network intrusion dataset with 9 attack types",
|
| 161 |
+
"urls": [
|
| 162 |
+
"https://raw.githubusercontent.com/jmnwong/UNSW-NB15/master/UNSW-NB15_1.csv"
|
| 163 |
+
],
|
| 164 |
+
"category": "intrusion",
|
| 165 |
+
"samples": 175000,
|
| 166 |
+
"features": [
|
| 167 |
+
"srcip",
|
| 168 |
+
"sport",
|
| 169 |
+
"dstip",
|
| 170 |
+
"dsport",
|
| 171 |
+
"proto",
|
| 172 |
+
"state",
|
| 173 |
+
"dur",
|
| 174 |
+
"sbytes",
|
| 175 |
+
"dbytes",
|
| 176 |
+
"sttl",
|
| 177 |
+
"dttl",
|
| 178 |
+
"attack_cat",
|
| 179 |
+
"label"
|
| 180 |
+
],
|
| 181 |
+
"target": "label",
|
| 182 |
+
"format": "csv",
|
| 183 |
+
"downloaded_at": "2026-01-29T16:35:02.792570",
|
| 184 |
+
"status": "available"
|
| 185 |
+
},
|
| 186 |
+
"ipsum_malicious_ips": {
|
| 187 |
+
"name": "IPsum Malicious IPs",
|
| 188 |
+
"description": "Daily updated list of malicious IP addresses",
|
| 189 |
+
"urls": [
|
| 190 |
+
"https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt"
|
| 191 |
+
],
|
| 192 |
+
"category": "threat_intel",
|
| 193 |
+
"samples": 25000,
|
| 194 |
+
"features": [
|
| 195 |
+
"ip_address",
|
| 196 |
+
"threat_level"
|
| 197 |
+
],
|
| 198 |
+
"target": "threat_level",
|
| 199 |
+
"format": "txt",
|
| 200 |
+
"downloaded_at": "2026-01-29T16:35:03.526227",
|
| 201 |
+
"status": "available"
|
| 202 |
+
},
|
| 203 |
+
"feodotracker_botnet": {
|
| 204 |
+
"name": "Feodo Tracker Botnet C2",
|
| 205 |
+
"description": "Botnet Command & Control server IPs",
|
| 206 |
+
"urls": [
|
| 207 |
+
"https://feodotracker.abuse.ch/downloads/ipblocklist.csv"
|
| 208 |
+
],
|
| 209 |
+
"category": "threat_intel",
|
| 210 |
+
"samples": 5000,
|
| 211 |
+
"features": [
|
| 212 |
+
"first_seen",
|
| 213 |
+
"dst_ip",
|
| 214 |
+
"dst_port",
|
| 215 |
+
"malware",
|
| 216 |
+
"status"
|
| 217 |
+
],
|
| 218 |
+
"target": "malware",
|
| 219 |
+
"format": "csv",
|
| 220 |
+
"downloaded_at": "2026-01-29T16:35:03.907662",
|
| 221 |
+
"status": "available"
|
| 222 |
+
},
|
| 223 |
+
"urlhaus_malicious": {
|
| 224 |
+
"name": "URLhaus Malicious URLs",
|
| 225 |
+
"description": "Database of malware distribution URLs",
|
| 226 |
+
"urls": [
|
| 227 |
+
"https://urlhaus.abuse.ch/downloads/csv_recent/"
|
| 228 |
+
],
|
| 229 |
+
"category": "threat_intel",
|
| 230 |
+
"samples": 10000,
|
| 231 |
+
"features": [
|
| 232 |
+
"dateadded",
|
| 233 |
+
"url",
|
| 234 |
+
"url_status",
|
| 235 |
+
"threat",
|
| 236 |
+
"tags",
|
| 237 |
+
"urlhaus_link"
|
| 238 |
+
],
|
| 239 |
+
"target": "threat",
|
| 240 |
+
"format": "csv",
|
| 241 |
+
"downloaded_at": "2026-01-29T16:35:04.832782",
|
| 242 |
+
"status": "available"
|
| 243 |
+
},
|
| 244 |
+
"spambase_uci": {
|
| 245 |
+
"name": "UCI Spambase",
|
| 246 |
+
"description": "Email spam classification with word frequencies",
|
| 247 |
+
"urls": [
|
| 248 |
+
"https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data"
|
| 249 |
+
],
|
| 250 |
+
"category": "spam",
|
| 251 |
+
"samples": 4601,
|
| 252 |
+
"features": [
|
| 253 |
+
"word_freq_make",
|
| 254 |
+
"word_freq_address",
|
| 255 |
+
"word_freq_all",
|
| 256 |
+
"char_freq_semicolon",
|
| 257 |
+
"char_freq_dollar",
|
| 258 |
+
"capital_run_avg",
|
| 259 |
+
"capital_run_longest",
|
| 260 |
+
"capital_run_total",
|
| 261 |
+
"is_spam"
|
| 262 |
+
],
|
| 263 |
+
"target": "is_spam",
|
| 264 |
+
"format": "data",
|
| 265 |
+
"downloaded_at": "2026-01-29T16:35:05.124845",
|
| 266 |
+
"status": "available"
|
| 267 |
+
},
|
| 268 |
+
"xss_payloads": {
|
| 269 |
+
"name": "XSS Attack Payloads",
|
| 270 |
+
"description": "Cross-site scripting attack patterns",
|
| 271 |
+
"urls": [
|
| 272 |
+
"https://raw.githubusercontent.com/payloadbox/xss-payload-list/master/Intruder/xss-payload-list.txt"
|
| 273 |
+
],
|
| 274 |
+
"category": "web_attack",
|
| 275 |
+
"samples": 5000,
|
| 276 |
+
"features": [
|
| 277 |
+
"payload",
|
| 278 |
+
"type"
|
| 279 |
+
],
|
| 280 |
+
"target": "type",
|
| 281 |
+
"format": "txt",
|
| 282 |
+
"downloaded_at": "2026-01-29T16:35:05.293648",
|
| 283 |
+
"status": "available"
|
| 284 |
+
},
|
| 285 |
+
"sql_injection_payloads": {
|
| 286 |
+
"name": "SQL Injection Payloads",
|
| 287 |
+
"description": "SQL injection attack patterns",
|
| 288 |
+
"urls": [
|
| 289 |
+
"https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Auth-Bypass.txt",
|
| 290 |
+
"https://raw.githubusercontent.com/payloadbox/sql-injection-payload-list/master/Intruder/SQL-Injection-Payloads/Error-Based.txt"
|
| 291 |
+
],
|
| 292 |
+
"category": "web_attack",
|
| 293 |
+
"samples": 3000,
|
| 294 |
+
"features": [
|
| 295 |
+
"payload",
|
| 296 |
+
"injection_type"
|
| 297 |
+
],
|
| 298 |
+
"target": "injection_type",
|
| 299 |
+
"format": "txt",
|
| 300 |
+
"downloaded_at": "2026-01-29T16:35:05.501629",
|
| 301 |
+
"status": "available"
|
| 302 |
+
},
|
| 303 |
+
"http_csic_requests": {
|
| 304 |
+
"name": "HTTP CSIC 2010 Dataset",
|
| 305 |
+
"description": "HTTP requests with web attacks (XSS, SQLi, etc.)",
|
| 306 |
+
"urls": [
|
| 307 |
+
"https://raw.githubusercontent.com/Morzeux/HttpRequestsDataset/master/csic_http/csic_2010_cleaned.csv"
|
| 308 |
+
],
|
| 309 |
+
"category": "web_attack",
|
| 310 |
+
"samples": 36000,
|
| 311 |
+
"features": [
|
| 312 |
+
"method",
|
| 313 |
+
"url",
|
| 314 |
+
"protocol",
|
| 315 |
+
"content",
|
| 316 |
+
"is_attack"
|
| 317 |
+
],
|
| 318 |
+
"target": "is_attack",
|
| 319 |
+
"format": "csv",
|
| 320 |
+
"downloaded_at": "2026-01-29T16:35:05.724490",
|
| 321 |
+
"status": "available"
|
| 322 |
+
},
|
| 323 |
+
"cryptomining_scripts": {
|
| 324 |
+
"name": "Cryptomining Script Detection",
|
| 325 |
+
"description": "JavaScript cryptomining patterns",
|
| 326 |
+
"urls": [
|
| 327 |
+
"https://raw.githubusercontent.com/ArslanKhan-cs/JSMiner/main/data/cryptominer.csv"
|
| 328 |
+
],
|
| 329 |
+
"category": "cryptomining",
|
| 330 |
+
"samples": 5000,
|
| 331 |
+
"features": [
|
| 332 |
+
"script_hash",
|
| 333 |
+
"obfuscated",
|
| 334 |
+
"api_calls",
|
| 335 |
+
"is_miner"
|
| 336 |
+
],
|
| 337 |
+
"target": "is_miner",
|
| 338 |
+
"format": "csv",
|
| 339 |
+
"downloaded_at": "2026-01-29T16:35:05.924379",
|
| 340 |
+
"status": "available"
|
| 341 |
+
},
|
| 342 |
+
"dga_domains": {
|
| 343 |
+
"name": "DGA Domain Detection",
|
| 344 |
+
"description": "Domain Generation Algorithm detection dataset",
|
| 345 |
+
"urls": [
|
| 346 |
+
"https://raw.githubusercontent.com/baderj/domain_generation_algorithms/master/dga_db/export/dga_domains_sample.csv"
|
| 347 |
+
],
|
| 348 |
+
"category": "dns",
|
| 349 |
+
"samples": 50000,
|
| 350 |
+
"features": [
|
| 351 |
+
"domain",
|
| 352 |
+
"family",
|
| 353 |
+
"length",
|
| 354 |
+
"entropy",
|
| 355 |
+
"consonant_ratio",
|
| 356 |
+
"is_dga"
|
| 357 |
+
],
|
| 358 |
+
"target": "is_dga",
|
| 359 |
+
"format": "csv",
|
| 360 |
+
"downloaded_at": "2026-01-29T16:35:06.692993",
|
| 361 |
+
"status": "available"
|
| 362 |
+
},
|
| 363 |
+
"ssl_certificates": {
|
| 364 |
+
"name": "SSL Certificate Analysis",
|
| 365 |
+
"description": "SSL certificate features for malicious detection",
|
| 366 |
+
"urls": [
|
| 367 |
+
"https://raw.githubusercontent.com/JustinGuese/ML-Security-SSL-Phishing/master/data/SSL-phishing.csv"
|
| 368 |
+
],
|
| 369 |
+
"category": "ssl",
|
| 370 |
+
"samples": 8000,
|
| 371 |
+
"features": [
|
| 372 |
+
"cert_issuer",
|
| 373 |
+
"cert_validity",
|
| 374 |
+
"domain_match",
|
| 375 |
+
"is_ev",
|
| 376 |
+
"cipher_strength",
|
| 377 |
+
"is_phishing"
|
| 378 |
+
],
|
| 379 |
+
"target": "is_phishing",
|
| 380 |
+
"format": "csv",
|
| 381 |
+
"downloaded_at": "2026-01-29T16:35:06.841582",
|
| 382 |
+
"status": "available"
|
| 383 |
+
},
|
| 384 |
+
"system_logs_hdfs": {
|
| 385 |
+
"name": "HDFS System Logs",
|
| 386 |
+
"description": "Hadoop system logs for anomaly detection",
|
| 387 |
+
"urls": [
|
| 388 |
+
"https://raw.githubusercontent.com/logpai/loghub/master/HDFS/HDFS.log_structured.csv"
|
| 389 |
+
],
|
| 390 |
+
"category": "logs",
|
| 391 |
+
"samples": 11000,
|
| 392 |
+
"features": [
|
| 393 |
+
"timestamp",
|
| 394 |
+
"level",
|
| 395 |
+
"component",
|
| 396 |
+
"content",
|
| 397 |
+
"event_template"
|
| 398 |
+
],
|
| 399 |
+
"target": "level",
|
| 400 |
+
"format": "csv",
|
| 401 |
+
"downloaded_at": "2026-01-29T16:35:07.926689",
|
| 402 |
+
"status": "available"
|
| 403 |
+
}
|
| 404 |
+
}
|
web_security/dga_domains/dga_domains_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/feodotracker_botnet/feodotracker_botnet_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/http_csic_requests/http_csic_requests_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/ipsum_malicious_ips/ipsum_malicious_ips_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/malware_pe_features/malware_pe_features_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/nsl_kdd_train/nsl_kdd_train_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/phishing_websites_uci/phishing_websites_uci_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/spambase_uci/spambase_uci_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/sql_injection_payloads/sql_injection_payloads_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/ssl_certificates/ssl_certificates_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/system_logs_hdfs/system_logs_hdfs_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/unsw_nb15/unsw_nb15_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/url_phishing_kaggle/url_phishing_kaggle_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/urlhaus_malicious/urlhaus_malicious_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
web_security/xss_payloads/xss_payloads_processed.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|