chYassine commited on
Commit
e2c0c99
·
verified ·
1 Parent(s): 8efbda5

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +12 -114
README.md CHANGED
@@ -1,120 +1,18 @@
1
- ---
2
- license: apache-2.0
3
- task_categories:
4
- - text-classification
5
- - other
6
- tags:
7
- - logs
8
- - cybersecurity
9
- - attack-detection
10
- - network-security
11
- size_categories:
12
- - 100K<n<1M
13
- configs:
14
- - config_name: default
15
- data_files:
16
- - split: train
17
- path: data/train-*
18
- dataset_info:
19
- features:
20
- - name: session_id
21
- dtype: string
22
- - name: logs
23
- list: string
24
- - name: metadata
25
- dtype: string
26
- - name: label
27
- dtype: int64
28
- - name: attack_ratio
29
- dtype: float64
30
- - name: severity_labels
31
- dtype: string
32
- - name: data_type
33
- dtype: string
34
- - name: is_attack
35
- dtype: bool
36
- - name: source
37
- dtype: string
38
- splits:
39
- - name: train
40
- num_bytes: 1804071139
41
- num_examples: 1704506
42
- download_size: 250820904
43
- dataset_size: 1804071139
44
- ---
45
 
46
- # ait-distilation-set
47
 
48
- Labeled log sessions dataset with attack information.
49
 
50
- ## Dataset Description
51
 
52
- This dataset combines log sessions from `chYassine/log-sessions-supervised` with attack labels from `chYassine/ait-attack`.
53
 
54
- ### Dataset Structure
55
 
56
- Each session contains:
57
- - **session_id**: Unique identifier for the session
58
- - **logs**: List of log entries (JSON strings)
59
- - **metadata**: Session metadata including log types, duration, host info
60
- - **log_types**: Types of logs in the session
61
- - **has_attack**: Boolean indicating if session contains attacks
62
- - **attack_types**: List of attack types found in the session
63
- - **attack_count**: Number of logs with attacks
64
- - **attack_ratio**: Ratio of attack logs to total logs
65
-
66
- ### Statistics
67
-
68
- - Total sessions: 1703363
69
- - Sessions with attacks: 1676374 (98.4%)
70
- - Sessions without attacks: 26989
71
-
72
- ### Log Types
73
-
74
- - intranet.flores.wheeler.biz-access.log: 345282
75
- - intranet.hallbrown.wilson.com-access.log: 342532
76
- - intranet.mannsmith.harrison.com-access.log: 332309
77
- - intranet.price.fox.org-access.log: 328655
78
- - dnsmasq: 301906
79
- - apache2: 12666
80
- - audit: 7838
81
- - intranet.smith.santos.com-access: 6215
82
- - intranet.smith.russellmitchell.com-access.log: 6136
83
- - dnsteal: 5464
84
-
85
- ### Attack Types
86
-
87
- - attacker_http,foothold,dirb: 1351557
88
- - dnsteal,attacker,dnsteal-received: 298307
89
- - attacker_http,foothold,wpscan: 22120
90
- - dns_scan,foothold: 2571
91
- - service_scan,foothold: 546
92
- - network_scan,foothold: 358
93
- - escalate,crack_passwords: 264
94
- - attacker_vpn,foothold: 181
95
- - attacker_http,foothold,webshell_cmd: 104
96
- - webshell_cmd,escalate: 75
97
-
98
- ## Usage
99
-
100
- ```python
101
- from datasets import load_dataset
102
-
103
- # Load the dataset
104
- dataset = load_dataset("chYassine/ait-distilation-set", split="train")
105
-
106
- # Example: Filter sessions with attacks
107
- attacks_only = dataset.filter(lambda x: x["has_attack"])
108
-
109
- # Example: Get sessions by log type
110
- dns_sessions = dataset.filter(lambda x: "dns" in x.get("log_types", []))
111
- ```
112
-
113
- ## Source Datasets
114
-
115
- - Sessions: [chYassine/log-sessions-supervised](https://huggingface.co/datasets/chYassine/log-sessions-supervised)
116
- - Attacks: [chYassine/ait-attack](https://huggingface.co/datasets/chYassine/ait-attack)
117
-
118
- ## Citation
119
-
120
- If you use this dataset, please cite the original datasets as well.
 
1
+ # LogAtlas-Defense-Set 🛡️🦊
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2
 
3
+ A heterogeneous, labeled log dataset designed for training and evaluating log-level and session-level classifiers that distinguish between normal behavior and cyberattacks across multiple sources (system, network, and application logs). It is intended as the “defense layer” of the LogAtlas ecosystem, focusing on robust, realistic attack detection under varied class distributions.
4
 
5
+ ## Mascot
6
 
7
+ ![ChatGPT Image Dec 14, 2025, 08_24_58 PM](https://cdn-uploads.huggingface.co/production/uploads/63fe5a071193ba2c229c29bf/vkh9n-MMEW2q2IGHGIznp.png)
8
 
9
+ The LogAtlas-Defense-Set mascot is a vigilant cyber guardian fox in lightweight futuristic armor, standing on a shield made of interlocking log fragments with threat heatmaps. Its glowing tail traces highlight red “attack regions in the log landscape, symbolizing precise and efficient detection of malicious activity in heterogeneous logs.
10
 
11
+ ## Dataset Overview
12
 
13
+ - **Goal**: Supervised training and evaluation of models that classify log sessions as normal or attack and support downstream severity-aware analysis.
14
+ - **Scope**: Multi-source logs (e.g., system, network, application) organized into sessions with rich metadata, including attack ratios and severity labels.
15
+ - **Use cases**:
16
+ - Training LLM-based or transformer-based detectors
17
+ - Benchmarking attack detection under different class distributions
18
+ - Studying severity-aware or source-aware threat modeling