Datasets:
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 9 new columns ({'roc_auc_per_pod_m1', 'pr_auc_per_pod_m1', 'split', 'fpr_at_r90_per_pod_m1', 'pr_auc_global', 'roc_auc_delta', 'fpr_at_r90_global', 'pr_auc_delta', 'roc_auc_global'}) and 12 missing columns ({'end_ts', 'scheduled_ts', 'cycle', 'run_id', 'duration_s', 'log_path', 'name', 'exit_code', 'victim_pod_patterns', 'start_ts', 'bucket', 'sim_hour'}).
This happened while the csv dataset builder was generating data using
hf://datasets/jniecko/ebpf-k8s-attack-detection/flat/comparison_global_vs_perpod_flat02.csv (at revision 0ed76b64dec8d9f90731aa9b47487fa9ef9602d2), [/tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
split: string
fpr_at_r90_global: double
fpr_at_r90_per_pod_m1: double
pr_auc_global: double
pr_auc_per_pod_m1: double
roc_auc_global: double
roc_auc_per_pod_m1: double
roc_auc_delta: double
pr_auc_delta: double
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1427
to
{'run_id': Value('string'), 'cycle': Value('int64'), 'name': Value('string'), 'bucket': Value('string'), 'sim_hour': Value('int64'), 'scheduled_ts': Value('float64'), 'start_ts': Value('float64'), 'end_ts': Value('float64'), 'duration_s': Value('float64'), 'exit_code': Value('int64'), 'log_path': Value('string'), 'victim_pod_patterns': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 9 new columns ({'roc_auc_per_pod_m1', 'pr_auc_per_pod_m1', 'split', 'fpr_at_r90_per_pod_m1', 'pr_auc_global', 'roc_auc_delta', 'fpr_at_r90_global', 'pr_auc_delta', 'roc_auc_global'}) and 12 missing columns ({'end_ts', 'scheduled_ts', 'cycle', 'run_id', 'duration_s', 'log_path', 'name', 'exit_code', 'victim_pod_patterns', 'start_ts', 'bucket', 'sim_hour'}).
This happened while the csv dataset builder was generating data using
hf://datasets/jniecko/ebpf-k8s-attack-detection/flat/comparison_global_vs_perpod_flat02.csv (at revision 0ed76b64dec8d9f90731aa9b47487fa9ef9602d2), [/tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
run_id string | cycle int64 | name string | bucket string | sim_hour int64 | scheduled_ts float64 | start_ts float64 | end_ts float64 | duration_s float64 | exit_code int64 | log_path string | victim_pod_patterns string |
|---|---|---|---|---|---|---|---|---|---|---|---|
flat02 | 2 | revshell | low | 2 | 1,777,464,007.741 | 1,777,464,007.742 | 1,777,464,039.284 | 31.543 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464007_revshell.log | recommendationservice |
flat02 | 2 | distroless_revshell | low | 6 | 1,777,464,247.741 | 1,777,464,247.741 | 1,777,464,279.317 | 31.576 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464247_distroless_revshell.log | shippingservice |
flat02 | 2 | k8sapi | mid | 9 | 1,777,464,427.741 | 1,777,464,427.741 | 1,777,464,449.585 | 21.844 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464427_k8sapi.log | recommendationservice |
flat02 | 2 | suid_escalation | mid | 13 | 1,777,464,667.741 | 1,777,464,667.742 | 1,777,464,674.215 | 6.474 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464667_suid_escalation.log | recommendationservice |
flat02 | 2 | ld_preload | peak | 17 | 1,777,464,907.741 | 1,777,464,907.741 | 1,777,464,975.405 | 67.663 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464907_ld_preload.log | recommendationservice |
flat02 | 2 | xmrig | peak | 20 | 1,777,465,087.741 | 1,777,465,087.741 | 1,777,465,408.928 | 321.187 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465087_xmrig.log | xmrig-attack |
flat02 | 3 | revshell | low | 2 | 1,777,465,447.741 | 1,777,465,447.741 | 1,777,465,479.209 | 31.468 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465447_revshell.log | recommendationservice |
flat02 | 3 | distroless_revshell | low | 6 | 1,777,465,687.741 | 1,777,465,687.741 | 1,777,465,719.625 | 31.884 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465687_distroless_revshell.log | shippingservice |
flat02 | 3 | k8sapi | mid | 9 | 1,777,465,867.741 | 1,777,465,867.741 | 1,777,465,889.638 | 21.897 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465867_k8sapi.log | recommendationservice |
flat02 | 3 | suid_escalation | mid | 13 | 1,777,466,107.741 | 1,777,466,107.741 | 1,777,466,114.518 | 6.777 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466107_suid_escalation.log | recommendationservice |
flat02 | 3 | ld_preload | peak | 17 | 1,777,466,347.741 | 1,777,466,347.741 | 1,777,466,415.411 | 67.67 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466347_ld_preload.log | recommendationservice |
flat02 | 3 | xmrig | peak | 20 | 1,777,466,527.741 | 1,777,466,527.742 | 1,777,466,848.52 | 320.779 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466527_xmrig.log | xmrig-attack |
flat02 | 4 | revshell | low | 2 | 1,777,466,887.741 | 1,777,466,887.741 | 1,777,466,919.005 | 31.264 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466887_revshell.log | recommendationservice |
flat02 | 4 | distroless_revshell | low | 6 | 1,777,467,127.741 | 1,777,467,127.741 | 1,777,467,159.031 | 31.29 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467127_distroless_revshell.log | shippingservice |
flat02 | 4 | k8sapi | mid | 9 | 1,777,467,307.741 | 1,777,467,307.742 | 1,777,467,329.754 | 22.013 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467307_k8sapi.log | recommendationservice |
flat02 | 4 | suid_escalation | mid | 13 | 1,777,467,547.741 | 1,777,467,547.742 | 1,777,467,554.518 | 6.776 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467547_suid_escalation.log | recommendationservice |
flat02 | 4 | ld_preload | peak | 17 | 1,777,467,787.741 | 1,777,467,787.741 | 1,777,467,855.413 | 67.671 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467787_ld_preload.log | recommendationservice |
flat02 | 4 | xmrig | peak | 20 | 1,777,467,967.741 | 1,777,467,967.742 | 1,777,468,289.988 | 322.247 | 0 | /home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467967_xmrig.log | xmrig-attack |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null |
eBPF Kubernetes Attack Detection — Syscall Aggregation Study
Dataset accompanying the paper:
In progress
Overview
Two experimental runs on a 4-node Kubernetes cluster (Kubernetes 1.35.4, Proxmox VMs, Intel Core i7-8700, 32 GB RAM) running the Online Boutique microservices application (11 services). Kernel events collected with Tracee 0.24 (21 event types). Traffic generated by Locust 2.43.
Two traffic profiles:
- Seasonal (
seasonal/) — diurnal load cycle, 20–200 virtual users - Flat (
flat/) — constant 100 virtual users
Each run: 5 cycles (TIME_SCALE=60, one simulated "day" = 24 min). Cycles 1–2: training phase (no attacks). Cycles 3–5: attack phase. 18 attack instances per run (6 types × 3 attack cycles).
Attack Types
| Attack | Description |
|---|---|
xmrig |
Cryptominer — high CPU, intensive sched_yield |
revshell |
Reverse shell via nc |
distroless_revshell |
Reverse shell in distroless container (no shell binary) |
k8sapi |
Kubernetes API abuse via service account token |
suid_escalation |
Privilege escalation via SUID binary |
ld_preload |
Shared library injection via LD_PRELOAD env variable |
Tracee Events Collected (21 types)
execve, openat, mmap, prctl, clone, sched_yield, socket, connect, dup2, pipe, mprotect, setuid, capset, chmod, stdio_over_socket, illegitimate_shell, mem_prot_alert, dynamic_code_loading, dropped_executable, k8s_api_connection, ld_preload
Repository Structure
seasonal/
attacks_run01.csv # Attack log (start/end times, exit codes)
features_run01.csv # 5-second windows: syscall counts + entropy
locust_run01.csv # Traffic telemetry (users, rps, p50/p95 latency)
latency_run01.csv # Detection latency per attack instance and model variant
metrics_run01.csv # ROC-AUC, PR-AUC, FPR@R90 per model variant
flat/
attacks_flat02.csv
features_flat02.csv
locust_flat02.csv
latency_flat02.csv
metrics_flat02.csv # Per-pod results
metrics_flat02_global.csv # Global aggregation results
metrics_flat02_perattack.csv # Per-attack-type breakdown
comparison_global_vs_perpod_flat02.csv
Key Results
| Variant | ROC-AUC |
|---|---|
| Flat / Global (F/G) | 0.881 |
| Flat / per-pod M2 (F/M2) | 0.785 |
| Flat / per-pod M1 (F/M1) | 0.763 |
| Seasonal / per-pod M2 (S/M2) | 0.849 |
| Seasonal / per-pod M1 (S/M1) | 0.825 |
| Seasonal / Global (S/G) | 0.720 |
M1 = syscall features only. M2 = M1 + Locust load features (req/s, p95 latency).
Reproducing Results
The full pipeline (notebooks) is in the companion repository. Below is a standalone recipe using only the CSV files in this dataset.
Step 1 — Join features + load + labels → training table
import numpy as np
import pandas as pd
RUN = "run01" # or "flat02"
WINDOW = 5.0
feat = pd.read_csv(f"seasonal/features_{RUN}.csv")
loc = pd.read_csv(f"seasonal/locust_{RUN}.csv")
atk = pd.read_csv(f"seasonal/attacks_{RUN}.csv")
# Downsample Locust (1 s) to 5-s windows
loc["window_start"] = (loc["ts"] // WINDOW) * WINDOW
loc5 = loc.groupby("window_start").agg(
users_mean=("users", "mean"),
rps=("current_rps", "mean"),
p95=("response_time_percentile_0_95", "mean"),
).reset_index()
df = feat.merge(loc5, on="window_start", how="left")
# Label: window overlaps an attack on the same pod
df["label"] = 0
for _, a in atk.iterrows():
mask = (
(df["window_start"] < a["end_ts"]) &
(df["window_start"] + WINDOW > a["start_ts"]) &
(df["pod_name"].str.contains(a["name"].split("_")[0], na=False))
)
df.loc[mask, "label"] = 1
Step 2 — Train M1 (syscalls only)
from sklearn.ensemble import IsolationForest
FEAT_M1 = [c for c in df.columns if c.startswith("count_") or
c in ("total_syscalls", "unique_syscalls", "entropy")]
# Temporal split: first half clean windows = train
split_ts = df.loc[df["label"] == 0, "window_start"].median()
train = df[(df["label"] == 0) & (df["window_start"] <= split_ts)]
test = df[~((df["label"] == 0) & (df["window_start"] <= split_ts))]
# Per-pod z-score normalisation
pod_mean = train.groupby("pod_name")[FEAT_M1].mean()
pod_std = train.groupby("pod_name")[FEAT_M1].std().replace(0, 1)
def normalise(rows, feat_cols):
out = rows.copy()
for pod, grp in rows.groupby("pod_name"):
mu = pod_mean.loc[pod] if pod in pod_mean.index else pod_mean.mean()
sd = pod_std.loc[pod] if pod in pod_std.index else pod_std.mean()
out.loc[grp.index, feat_cols] = (grp[feat_cols] - mu) / sd
return out
train_n = normalise(train, FEAT_M1)
test_n = normalise(test, FEAT_M1)
contamination = float(test["label"].mean())
m1 = IsolationForest(n_estimators=400, contamination=contamination, random_state=42)
m1.fit(train_n[FEAT_M1])
Step 3 — Train M2 (add load features)
FEAT_M2 = FEAT_M1 + ["rps", "p95"]
train_n2 = normalise(train, FEAT_M2)
test_n2 = normalise(test, FEAT_M2)
m2 = IsolationForest(n_estimators=400, contamination=contamination, random_state=42)
m2.fit(train_n2[FEAT_M2])
Step 4 — Evaluate
from sklearn.metrics import roc_auc_score
for name, model, feat_cols, data in [
("M1", m1, FEAT_M1, test_n),
("M2", m2, FEAT_M2, test_n2),
]:
scores = model.decision_function(data[feat_cols])
roc = roc_auc_score(data["label"], scores)
print(f"{name}: ROC-AUC = {roc:.3f}")
Expected output (seasonal run01): M1: ROC-AUC = 0.825, M2: ROC-AUC = 0.849
Detector
Isolation Forest (scikit-learn), temporal train/test split (cycles 1–2 train, cycles 3–5 test).
Contamination: 0.042 (per-pod), 0.40 (global).
Pre-trained models available at: jniecko/isolation-forest-k8s-ebpf
Feature Schema (features_*.csv)
| Column | Description |
|---|---|
timestamp |
Window start (Unix seconds) |
pod_name |
Pod identifier (per-pod variants) |
count_<event> |
Count of each Tracee event in the 5-s window |
total_syscalls |
Sum of all event counts |
unique_syscalls |
Number of distinct event types |
entropy |
Shannon entropy of the event distribution |
label |
1 = attack window, 0 = normal |
Citation
In progress
License
- Downloads last month
- 319