|
|
--- |
|
|
license: mit |
|
|
task_categories: |
|
|
- text-generation |
|
|
- feature-extraction |
|
|
language: |
|
|
- en |
|
|
tags: |
|
|
- system-calls |
|
|
- strace |
|
|
- linux |
|
|
- syscalls |
|
|
- operating-systems |
|
|
- code |
|
|
pretty_name: Linux Strace Traces Dataset |
|
|
size_categories: |
|
|
- n<1K |
|
|
--- |
|
|
|
|
|
# Linux Strace Traces Dataset |
|
|
|
|
|
A comprehensive collection of strace traces from common Linux utilities, designed for training AI models on system call patterns, program behavior analysis, and operating system interactions. |
|
|
|
|
|
## Dataset Description |
|
|
|
|
|
This dataset contains **357 strace traces** captured from 119 different Linux command-line utilities, with each utility executed 3 times to capture runtime variations. Each trace includes detailed system call information with timestamps, arguments, and execution times. |
|
|
|
|
|
### Dataset Statistics |
|
|
|
|
|
- **Total traces**: 357 (119 unique commands × 3 runs each) |
|
|
- **Categories**: 8 |
|
|
- **Format**: Parquet (Hugging Face native) |
|
|
- **Raw size**: ~40 MB |
|
|
- **Compressed size**: ~5 MB (Parquet) |
|
|
- **License**: MIT |
|
|
|
|
|
### Runtime Diversity |
|
|
|
|
|
Each command was executed 3 times to capture natural variations in program execution: |
|
|
- Different process IDs (PIDs) |
|
|
- Different memory addresses (ASLR randomization) |
|
|
- Different timestamps with microsecond precision |
|
|
- Slight variations in syscall timing |
|
|
|
|
|
This diversity helps train more robust AI models that can generalize across different execution contexts. |
|
|
|
|
|
### Categories |
|
|
|
|
|
1. **File I/O Operations** (75 traces = 25 commands × 3 runs) |
|
|
- File reading: `cat`, `head`, `tail`, `less` |
|
|
- File manipulation: `cp`, `mv`, `touch`, `rm` |
|
|
- Directory operations: `mkdir`, `rmdir`, `find` |
|
|
- File information: `stat`, `file`, `ls`, `du`, `df` |
|
|
|
|
|
2. **Text Processing** (69 traces = 23 commands × 3 runs) |
|
|
- Pattern matching: `grep` (simple, case-insensitive, recursive, count) |
|
|
- Text transformation: `sed`, `awk`, `tr` |
|
|
- Sorting & filtering: `sort`, `uniq`, `cut`, `paste` |
|
|
- Analysis: `wc`, `diff`, `cmp` |
|
|
|
|
|
3. **Process & System Info** (51 traces = 17 commands × 3 runs) |
|
|
- Process listing: `ps`, `top`, `pgrep` |
|
|
- System information: `uptime`, `who`, `whoami`, `id`, `uname`, `hostname` |
|
|
- Environment: `env`, `printenv` |
|
|
- Time: `date`, `cal` |
|
|
- Resources: `free`, `vmstat` |
|
|
|
|
|
4. **Networking** (33 traces = 11 commands × 3 runs) |
|
|
- Network requests: `ping`, `curl`, `wget` |
|
|
- DNS queries: `host`, `dig`, `nslookup` |
|
|
- Network info: `ip`, `ss`, `netstat` |
|
|
|
|
|
5. **Compression & Archives** (36 traces = 12 commands × 3 runs) |
|
|
- Tar operations: create, extract, list (with/without gzip) |
|
|
- Compression: `gzip`, `bzip2` |
|
|
- Zip operations: `zip`, `unzip` |
|
|
|
|
|
6. **Scripting & Execution** (45 traces = 15 commands × 3 runs) |
|
|
- Shell execution: `bash`, `sh` |
|
|
- Python execution: scripts and inline commands |
|
|
- Utilities: `sleep`, `echo`, `printf`, `yes`, `seq` |
|
|
- Tests: `true`, `false`, `test`, `expr` |
|
|
|
|
|
7. **Permissions & Ownership** (18 traces = 6 commands × 3 runs) |
|
|
- Permission modification: `chmod` (numeric, symbolic, recursive) |
|
|
- Permission viewing: `ls -l` |
|
|
- Umask operations |
|
|
|
|
|
8. **Data Operations** (30 traces = 10 commands × 3 runs) |
|
|
- Random data: `dd` with `/dev/urandom` and `/dev/zero` |
|
|
- Encoding: `base64` (encode/decode) |
|
|
- Hashing: `md5sum`, `sha1sum`, `sha256sum` |
|
|
- Binary analysis: `hexdump`, `od`, `strings` |
|
|
|
|
|
## Dataset Structure |
|
|
|
|
|
### Data Fields |
|
|
|
|
|
- `id` (string): Unique identifier for the trace (e.g., "cat_simple_run1") |
|
|
- `category` (string): Category of the utility (e.g., "file_io") |
|
|
- `command` (string): Full command executed (e.g., "cat test.txt") |
|
|
- `strace` (string): Complete strace output with system calls |
|
|
- `duration` (float): Execution time in seconds |
|
|
- `timestamp` (string): ISO 8601 timestamp of trace capture |
|
|
- `num_lines` (int): Number of lines in the strace output |
|
|
- `size_bytes` (int): Size of the strace output in bytes |
|
|
- `run_number` (int): Run iteration (1, 2, or 3) |
|
|
|
|
|
### Data Splits |
|
|
|
|
|
This dataset contains a single split: |
|
|
- `train`: 357 examples (119 unique commands × 3 runs) |
|
|
|
|
|
### Example |
|
|
|
|
|
```python |
|
|
from datasets import load_dataset |
|
|
|
|
|
dataset = load_dataset("YOUR_USERNAME/strace-dataset") |
|
|
|
|
|
# View first example |
|
|
example = dataset['train'][0] |
|
|
print(f"Command: {example['command']}") |
|
|
print(f"Category: {example['category']}") |
|
|
print(f"Duration: {example['duration']}s") |
|
|
print(f"Strace output (first 500 chars):\n{example['strace'][:500]}") |
|
|
``` |
|
|
|
|
|
## Dataset Creation |
|
|
|
|
|
### Source Data |
|
|
|
|
|
All traces were generated in a controlled, isolated environment using the `strace` utility with the following flags: |
|
|
- `-f`: Follow child processes |
|
|
- `-s 256`: Capture up to 256 bytes of string arguments |
|
|
- `-tt`: Absolute timestamps with microsecond precision |
|
|
- `-T`: Show time spent in each syscall |
|
|
|
|
|
### Data Collection Process |
|
|
|
|
|
1. Temporary workspace created with test files (text, binary, CSV, etc.) |
|
|
2. Each utility executed with typical arguments/use cases |
|
|
3. Strace captured all system calls during execution |
|
|
4. Test data cleaned up after collection |
|
|
5. No sensitive information or system-specific paths included |
|
|
|
|
|
### Safety & Privacy |
|
|
|
|
|
- ✅ No sensitive data (passwords, keys, tokens) |
|
|
- ✅ No user-specific information |
|
|
- ✅ No production system paths |
|
|
- ✅ All operations performed in temporary directories |
|
|
- ✅ Safe for open-source release |
|
|
|
|
|
## Use Cases |
|
|
|
|
|
### Training AI Models |
|
|
|
|
|
- **System call prediction**: Predict next system calls based on program behavior |
|
|
- **Anomaly detection**: Identify unusual syscall patterns |
|
|
- **Program behavior modeling**: Learn normal execution patterns |
|
|
- **Security analysis**: Detect potential malicious behavior |
|
|
|
|
|
### Analysis & Research |
|
|
|
|
|
- Understanding program execution flows |
|
|
- Comparing syscall patterns across utilities |
|
|
- Educational resource for OS concepts |
|
|
- Benchmark for trace analysis tools |
|
|
|
|
|
### Code Examples |
|
|
|
|
|
#### Load and explore the dataset |
|
|
|
|
|
```python |
|
|
from datasets import load_dataset |
|
|
import pandas as pd |
|
|
|
|
|
# Load dataset |
|
|
ds = load_dataset("andrew000/straces") |
|
|
|
|
|
# Convert to pandas for analysis |
|
|
df = pd.DataFrame(ds['train']) |
|
|
|
|
|
# Group by category |
|
|
print(df.groupby('category').size()) |
|
|
|
|
|
# Find longest-running commands |
|
|
print(df.nlargest(5, 'duration')[['command', 'duration']]) |
|
|
|
|
|
# Analyze strace patterns |
|
|
for example in ds['train']: |
|
|
if 'openat' in example['strace']: |
|
|
print(f"{example['command']} opens files") |
|
|
``` |
|
|
|
|
|
#### Extract specific syscalls |
|
|
|
|
|
```python |
|
|
import re |
|
|
|
|
|
def extract_syscalls(strace_output): |
|
|
"""Extract syscall names from strace output.""" |
|
|
pattern = r'\d+\s+[\d:.]+\s+(\w+)\(' |
|
|
return list(set(re.findall(pattern, strace_output))) |
|
|
|
|
|
# Find all syscalls used by cat |
|
|
cat_example = [ex for ex in ds['train'] if ex['id'] == 'cat_simple'][0] |
|
|
syscalls = extract_syscalls(cat_example['strace']) |
|
|
print(f"cat uses these syscalls: {syscalls}") |
|
|
``` |
|
|
|
|
|
## Limitations |
|
|
|
|
|
- Traces captured on a specific Linux system (kernel version may affect syscalls) |
|
|
- Limited to common command-line utilities |
|
|
- No multi-threaded or complex concurrent workloads |
|
|
- Dataset size: 357 traces (medium-sized dataset) |
|
|
|
|
|
## Future Work |
|
|
|
|
|
- Add more utilities and use cases |
|
|
- Include long-running processes |
|
|
- Multi-threaded application traces |
|
|
- Different input sizes for scalability analysis |
|
|
- Traces from different Linux distributions/kernels |
|
|
|
|
|
## Citation |
|
|
|
|
|
If you use this dataset in your research, please cite: |
|
|
|
|
|
```bibtex |
|
|
@dataset{strace_traces_2025, |
|
|
title={Linux Strace Traces Dataset}, |
|
|
author={Andrew Fasano}, |
|
|
year={2025}, |
|
|
publisher={Hugging Face}, |
|
|
howpublished={\url{https://huggingface.co/datasets/andrew000/straces}} |
|
|
} |
|
|
``` |
|
|
|
|
|
## License |
|
|
|
|
|
MIT License - See LICENSE file for details |
|
|
|
|
|
## Acknowledgments |
|
|
|
|
|
Generated using the `strace` utility on Linux. All traces are from standard open-source utilities. |
|
|
|