Dataset Viewer
Auto-converted to Parquet Duplicate
session_id
string
logs
list
metadata
string
label
int64
attack_ratio
float64
severity_labels
string
data_type
string
is_attack
bool
source
string
attacker_0_20220113_1320
[ "{\"timestamp\":\"1642080091884\",\"no_\":\"58\",\"time\":\"46.157948\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"309\",\"info\":\"Standard query 0x06d4 A 3x6-.2-.DASkBwIEhPg\\/zTW0dTD*Y*9EfI9MHx1AyLdwlFudk0SpbhYbyN5fQiwKbMdk-.efWXRababxXzj2zigm*IXkCiU5E5pvsTSc...
{"duration_seconds": 179.312, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 6}
0
0
["", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1325
[ "{\"timestamp\":\"1642080317271\",\"no_\":\"115\",\"time\":\"271.545365\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x30ec A 3x6-.17-.pfNhh2XdGPzc9zT08GJH9DXvsS7H9KbplvVbuRlZPJdEggzpL7xJmrsPKecJ-.ubC6MW9in72oHE7hxwZArdpXA2UeCe\\/...
{"duration_seconds": 269.487, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8}
0
0
["", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1330
[ "{\"timestamp\":\"1642080632843\",\"no_\":\"192\",\"time\":\"587.117218\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0xcc19 A 3x6-.37-.K1i2ObYdTNCSqcvtveOElTqXQsSwAvI0r5o3vh2bZPP4AoxoyIDh91Rsh3lt-.m8aGbEFwaAFY3h3ma4vuablMjvnQXD0Wv...
{"duration_seconds": 236.414, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 7}
0
0
["", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1335
[ "{\"timestamp\":\"1642080901312\",\"no_\":\"249\",\"time\":\"855.586517\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x66b7 A 3x6-.54-.soPkf5wuqgwA9vm1\\/S06ed30*kbUrrh19M6tDdKcs6bG9GunU*i2fn2SIyCN-.IYAXrAU5YJ16k5EPETqMXZ...
{"duration_seconds": 282.504, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8}
0
0
["", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1340
[ "{\"timestamp\":\"1642081210872\",\"no_\":\"326\",\"time\":\"1165.146208\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x223d A 3x6-.74-.I5tnuVrVTnFZHC2\\/b5kc*LRjQ5E\\/Fz5dp*VOoj4*s3C2ua*YXAQeJjpuYi*5-.lJMUxkwWP5IHrt92cZa...
{"duration_seconds": 278.502, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8}
0
0
["", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1345
[ "{\"timestamp\":\"1642081521431\",\"no_\":\"399\",\"time\":\"1475.704894\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x1e47 A 3x6-.94-.kckxQ3G1yW28JRaxBB81Gju7BCrQbAinmdylk7VAq9hRDwFvn*2wAMSTt\\/Iv-.MRplX6TlZXK9Czo5r5t7s...
{"duration_seconds": 262.493, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8}
0
0
["", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1350
[ "{\"timestamp\":\"1642081814980\",\"no_\":\"469\",\"time\":\"1769.254486\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x6c73 A 3x6-.14-.HsD5SjYHZa3e1uo*g\\/gkCMnbwUg\\/eFKmfXvXjdht5Pf06HR1HWgOtpqGnqs*-.VU0gWPabBmI5xQGY8j7...
{"duration_seconds": 284.48, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8}
0
0
["", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1355
[ "{\"timestamp\":\"1642082128515\",\"no_\":\"563\",\"time\":\"2082.789286\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x8d96 A 3x6-.34-.n2EU3\\/RhYGJoZp\\/YUoemh7s\\/vLlyjoX4l6t*o1tVnq4vKxBmJvqw1KVqQSUc-.BXQItFW8JxBBdgDx2...
{"duration_seconds": 237.4, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 7}
0
0
["", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1400
[ "{\"timestamp\":\"1642082412004\",\"no_\":\"642\",\"time\":\"2366.277551\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x06e5 A 3x6-.52-.z9h591Ghfp7CXuj7gG1QhmRi3tV7aSZ2I9*aIEdoftbsecqmKd9uGYk\\/gQsJ-.tDCtWd273lpQnxxVmzja796weJXSQW...
{"duration_seconds": 280.869, "host": "attacker_0", "hour": 14, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 30}
0
0
["", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", ""]
session
false
log-sessions-supervised
attacker_0_20220113_1405
["{\"timestamp\":\"1642082702529\",\"no_\":\"10911\",\"time\":\"2656.803484\",\"source\":\"<IP:a065a(...TRUNCATED)
"{\"duration_seconds\": 261.497, \"host\": \"attacker_0\", \"hour\": 14, \"is_weekend\": false, \"lo(...TRUNCATED)
0
0
"[\"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"(...TRUNCATED)
session
false
log-sessions-supervised
End of preview. Expand in Data Studio

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

LogAtlas-Defense-Set 🛡️🦊

A heterogeneous, labeled log dataset designed for training and evaluating log-level and session-level classifiers that distinguish between normal behavior and cyberattacks across multiple sources (system, network, and application logs). It is intended as the “defense layer” of the LogAtlas ecosystem, focusing on robust, realistic attack detection under varied class distributions.

Mascot

ChatGPT Image Dec 14, 2025, 08_24_54 PM

The LogAtlas-Defense-Set mascot is a vigilant cyber guardian fox in lightweight futuristic armor, standing on a shield made of interlocking log fragments with threat heatmaps. Its glowing tail traces highlight red “attack” regions in the log landscape, symbolizing precise and efficient detection of malicious activity in heterogeneous logs.

Dataset Overview

  • Goal: Supervised training and evaluation of models that classify log sessions as normal or attack and support downstream severity-aware analysis.
  • Scope: Multi-source logs (e.g., system, network, application) organized into sessions with rich metadata, including attack ratios and severity labels.
  • Use cases:
    • Training LLM-based or transformer-based detectors
    • Benchmarking attack detection under different class distributions
    • Studying severity-aware or source-aware threat modeling
Downloads last month
17