Che237 commited on
Commit
9232cb3
·
verified ·
1 Parent(s): 5156284

Upload metadata.json with huggingface_hub

Browse files
Files changed (1) hide show
  1. metadata.json +336 -0
metadata.json ADDED
@@ -0,0 +1,336 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ <<<<<<< Updated upstream
3
+ "malware_detection": {
4
+ "name": "Malware Detection Dataset",
5
+ "description": "Collection of malware samples and features for detection",
6
+ "url": "https://raw.githubusercontent.com/Haggai-dev665/cybersecurity-datasets/main/malware_detection_sample.csv",
7
+ "backup_urls": [
8
+ "https://github.com/fabriceyhc/SilkRoad/raw/master/data/sr2_drugs_A_Z.csv",
9
+ "https://raw.githubusercontent.com/rshipp/awesome-malware-analysis/master/README.md"
10
+ ],
11
+ "type": "malware",
12
+ "size_mb": 15,
13
+ "samples": 10000,
14
+ "features": [
15
+ "file_hash",
16
+ "file_size",
17
+ "entropy",
18
+ "pe_sections",
19
+ "imports",
20
+ "exports",
21
+ "strings_count",
22
+ "is_malware"
23
+ ],
24
+ "downloaded_at": "2025-08-24T04:08:53.231337",
25
+ "status": "available",
26
+ "local_path": "..\\datasets\\malware_detection"
27
+ },
28
+ "network_intrusion": {
29
+ "name": "Network Intrusion Detection",
30
+ "description": "Network traffic data for intrusion detection - NSL-KDD Dataset",
31
+ "url": "https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.csv",
32
+ "backup_urls": [
33
+ "https://github.com/jmnwong/NSL-KDD-Dataset/raw/master/KDDTrain%2B.csv",
34
+ "https://www.unb.ca/cic/datasets/nsl.html"
35
+ ],
36
+ "type": "network",
37
+ "size_mb": 25,
38
+ "samples": 125973,
39
+ =======
40
+ "network_intrusion": {
41
+ "name": "Network Intrusion Detection",
42
+ "description": "Network traffic data for intrusion detection",
43
+ "url": "http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz",
44
+ "type": "network",
45
+ "size_mb": 75,
46
+ "samples": 494021,
47
+ >>>>>>> Stashed changes
48
+ "features": [
49
+ "duration",
50
+ "protocol_type",
51
+ "service",
52
+ "flag",
53
+ "src_bytes",
54
+ <<<<<<< Updated upstream
55
+ "dst_bytes",
56
+ "land",
57
+ "wrong_fragment",
58
+ "urgent"
59
+ ],
60
+ "downloaded_at": "2025-08-24T04:13:30.389265",
61
+ =======
62
+ "dst_bytes"
63
+ ],
64
+ "downloaded_at": "2025-08-24T03:00:40.259137",
65
+ >>>>>>> Stashed changes
66
+ "status": "available",
67
+ "local_path": "..\\datasets\\network_intrusion"
68
+ },
69
+ "phishing_detection": {
70
+ "name": "Phishing Website Detection",
71
+ "description": "Features extracted from websites for phishing detection",
72
+ <<<<<<< Updated upstream
73
+ "url": "https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv",
74
+ "backup_urls": [
75
+ "https://github.com/ebubekirbbr/pdd/raw/master/Phishing_Legitimate_full.csv"
76
+ ],
77
+ "type": "phishing",
78
+ "size_mb": 8,
79
+ =======
80
+ "url": "https://archive.ics.uci.edu/ml/machine-learning-databases/00327/Training%20Dataset.arff",
81
+ "type": "phishing",
82
+ "size_mb": 12,
83
+ >>>>>>> Stashed changes
84
+ "samples": 11055,
85
+ "features": [
86
+ "url_length",
87
+ "num_dots",
88
+ "subdomain_level",
89
+ "https",
90
+ <<<<<<< Updated upstream
91
+ "shortening_service",
92
+ "prefix_suffix",
93
+ "result"
94
+ ],
95
+ "downloaded_at": "2025-08-24T04:13:51.358553",
96
+ =======
97
+ "shortening_service"
98
+ ],
99
+ "downloaded_at": "2025-08-24T03:00:53.776547",
100
+ >>>>>>> Stashed changes
101
+ "status": "available",
102
+ "local_path": "..\\datasets\\phishing_detection"
103
+ },
104
+ "spam_detection": {
105
+ "name": "Spam Email Detection",
106
+ "description": "Email features for spam classification",
107
+ <<<<<<< Updated upstream
108
+ "url": "https://raw.githubusercontent.com/MWiechmann/enron_spam_data/master/enron_spam_data.csv",
109
+ "backup_urls": [
110
+ "https://github.com/jbrownlee/Datasets/raw/master/spambase.csv"
111
+ ],
112
+ =======
113
+ "url": "https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data",
114
+ >>>>>>> Stashed changes
115
+ "type": "spam",
116
+ "size_mb": 5,
117
+ "samples": 4601,
118
+ "features": [
119
+ "word_freq_make",
120
+ "word_freq_address",
121
+ "word_freq_all",
122
+ "char_freq_$",
123
+ <<<<<<< Updated upstream
124
+ "capital_run_avg",
125
+ "is_spam"
126
+ ],
127
+ "downloaded_at": "2025-08-24T04:14:02.230888",
128
+ "status": "available",
129
+ "local_path": "..\\datasets\\spam_detection"
130
+ },
131
+ "botnet_detection": {
132
+ "name": "Botnet Traffic Detection",
133
+ "description": "Network flows for botnet detection - CICIDS Dataset",
134
+ "url": "https://raw.githubusercontent.com/AhmadMamduhh/CICIDS2017-Dataset/main/MachineLearningCVE/Friday-WorkingHours-Afternoon-DDos.pcap_ISCX.csv",
135
+ "backup_urls": [
136
+ "https://github.com/RUCD/CICIDS2017_ML/raw/master/dataset/CICIDS2017_sample.csv"
137
+ ],
138
+ "type": "botnet",
139
+ "size_mb": 50,
140
+ "samples": 80000,
141
+ "features": [
142
+ "flow_duration",
143
+ "total_fwd_packets",
144
+ "total_bwd_packets",
145
+ "flow_bytes_s",
146
+ "flow_packets_s",
147
+ "label"
148
+ ],
149
+ "downloaded_at": "2025-08-24T04:15:19.808350",
150
+ "status": "available",
151
+ "local_path": "..\\datasets\\botnet_detection"
152
+ },
153
+ "vulnerability_assessment": {
154
+ "name": "CVE Vulnerability Database",
155
+ "description": "Common Vulnerabilities and Exposures database entries",
156
+ "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/0xxx/CVE-2023-0001.json",
157
+ "backup_urls": [
158
+ "https://raw.githubusercontent.com/olbat/nvdcve/master/nvdcve/cve_feeds.py"
159
+ ],
160
+ "type": "vulnerability",
161
+ "size_mb": 20,
162
+ "samples": 5000,
163
+ =======
164
+ "capital_run_avg"
165
+ ],
166
+ "downloaded_at": "2025-08-24T03:01:05.413316",
167
+ "status": "available",
168
+ "local_path": "..\\datasets\\spam_detection"
169
+ },
170
+ "vulnerability_assessment": {
171
+ "name": "Vulnerability Assessment Data",
172
+ "description": "System vulnerabilities and CVE data",
173
+ "url": "https://cve.mitre.org/data/downloads/allitems.csv",
174
+ "type": "vulnerability",
175
+ "size_mb": 80,
176
+ "samples": 200000,
177
+ >>>>>>> Stashed changes
178
+ "features": [
179
+ "cve_id",
180
+ "description",
181
+ "severity",
182
+ <<<<<<< Updated upstream
183
+ "cvss_score",
184
+ "attack_vector",
185
+ "attack_complexity"
186
+ ],
187
+ "downloaded_at": "2025-08-24T04:15:31.245378",
188
+ =======
189
+ "impact",
190
+ "exploitability"
191
+ ],
192
+ "downloaded_at": "2025-08-24T03:05:15.065965",
193
+ >>>>>>> Stashed changes
194
+ "status": "available",
195
+ "local_path": "..\\datasets\\vulnerability_assessment"
196
+ },
197
+ "threat_intelligence": {
198
+ "name": "Threat Intelligence Feeds",
199
+ <<<<<<< Updated upstream
200
+ "description": "Malicious IP addresses and indicators of compromise",
201
+ "url": "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt",
202
+ "backup_urls": [
203
+ "https://github.com/firehol/blocklist-ipsets/raw/master/firehol_level1.netset"
204
+ ],
205
+ "type": "threat_intel",
206
+ "size_mb": 5,
207
+ "samples": 15000,
208
+ =======
209
+ "description": "IOCs and threat indicators",
210
+ "url": "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt",
211
+ "type": "threat_intel",
212
+ "size_mb": 25,
213
+ "samples": 50000,
214
+ >>>>>>> Stashed changes
215
+ "features": [
216
+ "ip_address",
217
+ "threat_type",
218
+ "confidence",
219
+ "first_seen",
220
+ <<<<<<< Updated upstream
221
+ "last_seen",
222
+ "source"
223
+ ],
224
+ "downloaded_at": "2025-08-24T04:15:57.202336",
225
+ "status": "available",
226
+ "local_path": "..\\datasets\\threat_intelligence"
227
+ },
228
+ "anomaly_detection": {
229
+ "name": "System Anomaly Detection",
230
+ "description": "System logs and behavior for anomaly detection",
231
+ "url": "https://raw.githubusercontent.com/logpai/loghub/master/Windows/Windows_2k.log_structured.csv",
232
+ "backup_urls": [
233
+ "https://github.com/elastic/examples/raw/master/Machine%20Learning/Security%20Analytics/suspicious_login_data.csv"
234
+ ],
235
+ "type": "anomaly",
236
+ "size_mb": 30,
237
+ "samples": 25000,
238
+ "features": [
239
+ "timestamp",
240
+ "event_id",
241
+ "user",
242
+ "action",
243
+ "resource",
244
+ "status",
245
+ "anomaly_score"
246
+ ],
247
+ "downloaded_at": "2025-08-24T04:16:34.439455",
248
+ "status": "available",
249
+ "local_path": "..\\datasets\\anomaly_detection"
250
+ },
251
+ "dns_tunneling": {
252
+ "name": "DNS Tunneling Detection",
253
+ "description": "DNS queries analysis for detecting tunneling attacks",
254
+ "url": "https://raw.githubusercontent.com/Yara-Rules/rules/master/malware/APT_DNS_Tunneling.yar",
255
+ "backup_urls": [
256
+ "https://github.com/gamelinux/passivedns/archive/master.zip"
257
+ ],
258
+ "type": "dns",
259
+ "size_mb": 15,
260
+ "samples": 10000,
261
+ =======
262
+ "last_seen"
263
+ ],
264
+ "downloaded_at": "2025-08-24T03:07:20.977810",
265
+ "status": "available",
266
+ "local_path": "..\\datasets\\threat_intelligence"
267
+ },
268
+ "dns_tunneling": {
269
+ "name": "DNS Tunneling Detection",
270
+ "description": "DNS queries for tunneling detection",
271
+ "url": "https://github.com/gamelinux/passivedns/archive/master.zip",
272
+ "type": "dns",
273
+ "size_mb": 100,
274
+ "samples": 150000,
275
+ >>>>>>> Stashed changes
276
+ "features": [
277
+ "query_name",
278
+ "query_type",
279
+ "response_code",
280
+ "query_length",
281
+ <<<<<<< Updated upstream
282
+ "subdomain_count",
283
+ "is_tunneling"
284
+ ],
285
+ "downloaded_at": "2025-08-24T04:17:07.702230",
286
+ "status": "available",
287
+ "local_path": "..\\datasets\\dns_tunneling"
288
+ },
289
+ "web_attack_detection": {
290
+ "name": "Web Application Attack Detection",
291
+ "description": "HTTP requests classified for web attack detection",
292
+ "url": "https://raw.githubusercontent.com/cure53/HTTPLeaks/master/payloads.txt",
293
+ "backup_urls": [
294
+ "https://github.com/foospidy/payloads/raw/master/other/injection/sql_injection/payloads.txt"
295
+ ],
296
+ "type": "web_attack",
297
+ "size_mb": 12,
298
+ "samples": 8000,
299
+ "features": [
300
+ "request_method",
301
+ "url",
302
+ "payload",
303
+ "user_agent",
304
+ "response_code",
305
+ "is_attack"
306
+ ],
307
+ "downloaded_at": "2025-08-24T04:17:27.205436",
308
+ "status": "available",
309
+ "local_path": "..\\datasets\\web_attack_detection"
310
+ =======
311
+ "subdomain_count"
312
+ ],
313
+ "downloaded_at": "2025-08-24T03:09:42.432718",
314
+ "status": "available",
315
+ "local_path": "..\\datasets\\dns_tunneling"
316
+ },
317
+ "cryptomining_detection": {
318
+ "name": "Cryptocurrency Mining Detection",
319
+ "description": "System behavior patterns for cryptomining detection",
320
+ "url": "https://github.com/JPCERTCC/MalConfScan/archive/master.zip",
321
+ "type": "cryptomining",
322
+ "size_mb": 60,
323
+ "samples": 30000,
324
+ "features": [
325
+ "cpu_usage",
326
+ "memory_usage",
327
+ "network_connections",
328
+ "process_behavior",
329
+ "file_modifications"
330
+ ],
331
+ "downloaded_at": "2025-08-24T03:10:20.625272",
332
+ "status": "available",
333
+ "local_path": "..\\datasets\\cryptomining_detection"
334
+ >>>>>>> Stashed changes
335
+ }
336
+ }