Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 9 new columns ({'roc_auc_per_pod_m1', 'pr_auc_per_pod_m1', 'split', 'fpr_at_r90_per_pod_m1', 'pr_auc_global', 'roc_auc_delta', 'fpr_at_r90_global', 'pr_auc_delta', 'roc_auc_global'}) and 12 missing columns ({'end_ts', 'scheduled_ts', 'cycle', 'run_id', 'duration_s', 'log_path', 'name', 'exit_code', 'victim_pod_patterns', 'start_ts', 'bucket', 'sim_hour'}).

This happened while the csv dataset builder was generating data using

hf://datasets/jniecko/ebpf-k8s-attack-detection/flat/comparison_global_vs_perpod_flat02.csv (at revision 0ed76b64dec8d9f90731aa9b47487fa9ef9602d2), [/tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv)]

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
                  self._write_table(pa_table, writer_batch_size=writer_batch_size)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              split: string
              fpr_at_r90_global: double
              fpr_at_r90_per_pod_m1: double
              pr_auc_global: double
              pr_auc_per_pod_m1: double
              roc_auc_global: double
              roc_auc_per_pod_m1: double
              roc_auc_delta: double
              pr_auc_delta: double
              -- schema metadata --
              pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1427
              to
              {'run_id': Value('string'), 'cycle': Value('int64'), 'name': Value('string'), 'bucket': Value('string'), 'sim_hour': Value('int64'), 'scheduled_ts': Value('float64'), 'start_ts': Value('float64'), 'end_ts': Value('float64'), 'duration_s': Value('float64'), 'exit_code': Value('int64'), 'log_path': Value('string'), 'victim_pod_patterns': Value('string')}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
                  builder.download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
                  self._download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 9 new columns ({'roc_auc_per_pod_m1', 'pr_auc_per_pod_m1', 'split', 'fpr_at_r90_per_pod_m1', 'pr_auc_global', 'roc_auc_delta', 'fpr_at_r90_global', 'pr_auc_delta', 'roc_auc_global'}) and 12 missing columns ({'end_ts', 'scheduled_ts', 'cycle', 'run_id', 'duration_s', 'log_path', 'name', 'exit_code', 'victim_pod_patterns', 'start_ts', 'bucket', 'sim_hour'}).
              
              This happened while the csv dataset builder was generating data using
              
              hf://datasets/jniecko/ebpf-k8s-attack-detection/flat/comparison_global_vs_perpod_flat02.csv (at revision 0ed76b64dec8d9f90731aa9b47487fa9ef9602d2), [/tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/attacks_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/comparison_global_vs_perpod_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/features_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/latency_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/locust_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_global.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/flat/metrics_flat02_perattack.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/attacks_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/features_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/latency_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/locust_run02.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run01.csv), /tmp/hf-datasets-cache/medium/datasets/96750370168158-config-parquet-and-info-jniecko-ebpf-k8s-attack-d-6f6c752b/hub/datasets--jniecko--ebpf-k8s-attack-detection/snapshots/0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv (origin=hf://datasets/jniecko/ebpf-k8s-attack-detection@0ed76b64dec8d9f90731aa9b47487fa9ef9602d2/seasonal/metrics_run02.csv)]
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

run_id
string
cycle
int64
name
string
bucket
string
sim_hour
int64
scheduled_ts
float64
start_ts
float64
end_ts
float64
duration_s
float64
exit_code
int64
log_path
string
victim_pod_patterns
string
flat02
2
revshell
low
2
1,777,464,007.741
1,777,464,007.742
1,777,464,039.284
31.543
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464007_revshell.log
recommendationservice
flat02
2
distroless_revshell
low
6
1,777,464,247.741
1,777,464,247.741
1,777,464,279.317
31.576
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464247_distroless_revshell.log
shippingservice
flat02
2
k8sapi
mid
9
1,777,464,427.741
1,777,464,427.741
1,777,464,449.585
21.844
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464427_k8sapi.log
recommendationservice
flat02
2
suid_escalation
mid
13
1,777,464,667.741
1,777,464,667.742
1,777,464,674.215
6.474
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464667_suid_escalation.log
recommendationservice
flat02
2
ld_preload
peak
17
1,777,464,907.741
1,777,464,907.741
1,777,464,975.405
67.663
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777464907_ld_preload.log
recommendationservice
flat02
2
xmrig
peak
20
1,777,465,087.741
1,777,465,087.741
1,777,465,408.928
321.187
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465087_xmrig.log
xmrig-attack
flat02
3
revshell
low
2
1,777,465,447.741
1,777,465,447.741
1,777,465,479.209
31.468
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465447_revshell.log
recommendationservice
flat02
3
distroless_revshell
low
6
1,777,465,687.741
1,777,465,687.741
1,777,465,719.625
31.884
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465687_distroless_revshell.log
shippingservice
flat02
3
k8sapi
mid
9
1,777,465,867.741
1,777,465,867.741
1,777,465,889.638
21.897
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777465867_k8sapi.log
recommendationservice
flat02
3
suid_escalation
mid
13
1,777,466,107.741
1,777,466,107.741
1,777,466,114.518
6.777
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466107_suid_escalation.log
recommendationservice
flat02
3
ld_preload
peak
17
1,777,466,347.741
1,777,466,347.741
1,777,466,415.411
67.67
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466347_ld_preload.log
recommendationservice
flat02
3
xmrig
peak
20
1,777,466,527.741
1,777,466,527.742
1,777,466,848.52
320.779
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466527_xmrig.log
xmrig-attack
flat02
4
revshell
low
2
1,777,466,887.741
1,777,466,887.741
1,777,466,919.005
31.264
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777466887_revshell.log
recommendationservice
flat02
4
distroless_revshell
low
6
1,777,467,127.741
1,777,467,127.741
1,777,467,159.031
31.29
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467127_distroless_revshell.log
shippingservice
flat02
4
k8sapi
mid
9
1,777,467,307.741
1,777,467,307.742
1,777,467,329.754
22.013
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467307_k8sapi.log
recommendationservice
flat02
4
suid_escalation
mid
13
1,777,467,547.741
1,777,467,547.742
1,777,467,554.518
6.776
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467547_suid_escalation.log
recommendationservice
flat02
4
ld_preload
peak
17
1,777,467,787.741
1,777,467,787.741
1,777,467,855.413
67.671
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467787_ld_preload.log
recommendationservice
flat02
4
xmrig
peak
20
1,777,467,967.741
1,777,467,967.742
1,777,468,289.988
322.247
0
/home/jniecko/WorkDir/NowyPomysl4/data/attack_logs/1777467967_xmrig.log
xmrig-attack
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
End of preview.

eBPF Kubernetes Attack Detection — Syscall Aggregation Study

Dataset accompanying the paper:

In progress

Overview

Two experimental runs on a 4-node Kubernetes cluster (Kubernetes 1.35.4, Proxmox VMs, Intel Core i7-8700, 32 GB RAM) running the Online Boutique microservices application (11 services). Kernel events collected with Tracee 0.24 (21 event types). Traffic generated by Locust 2.43.

Two traffic profiles:

  • Seasonal (seasonal/) — diurnal load cycle, 20–200 virtual users
  • Flat (flat/) — constant 100 virtual users

Each run: 5 cycles (TIME_SCALE=60, one simulated "day" = 24 min). Cycles 1–2: training phase (no attacks). Cycles 3–5: attack phase. 18 attack instances per run (6 types × 3 attack cycles).

Attack Types

Attack Description
xmrig Cryptominer — high CPU, intensive sched_yield
revshell Reverse shell via nc
distroless_revshell Reverse shell in distroless container (no shell binary)
k8sapi Kubernetes API abuse via service account token
suid_escalation Privilege escalation via SUID binary
ld_preload Shared library injection via LD_PRELOAD env variable

Tracee Events Collected (21 types)

execve, openat, mmap, prctl, clone, sched_yield, socket, connect, dup2, pipe, mprotect, setuid, capset, chmod, stdio_over_socket, illegitimate_shell, mem_prot_alert, dynamic_code_loading, dropped_executable, k8s_api_connection, ld_preload

Repository Structure

seasonal/
  attacks_run01.csv     # Attack log (start/end times, exit codes)
  features_run01.csv    # 5-second windows: syscall counts + entropy
  locust_run01.csv      # Traffic telemetry (users, rps, p50/p95 latency)
  latency_run01.csv     # Detection latency per attack instance and model variant
  metrics_run01.csv     # ROC-AUC, PR-AUC, FPR@R90 per model variant

flat/
  attacks_flat02.csv
  features_flat02.csv
  locust_flat02.csv
  latency_flat02.csv
  metrics_flat02.csv              # Per-pod results
  metrics_flat02_global.csv       # Global aggregation results
  metrics_flat02_perattack.csv    # Per-attack-type breakdown
  comparison_global_vs_perpod_flat02.csv

Key Results

Variant ROC-AUC
Flat / Global (F/G) 0.881
Flat / per-pod M2 (F/M2) 0.785
Flat / per-pod M1 (F/M1) 0.763
Seasonal / per-pod M2 (S/M2) 0.849
Seasonal / per-pod M1 (S/M1) 0.825
Seasonal / Global (S/G) 0.720

M1 = syscall features only. M2 = M1 + Locust load features (req/s, p95 latency).

Reproducing Results

The full pipeline (notebooks) is in the companion repository. Below is a standalone recipe using only the CSV files in this dataset.

Step 1 — Join features + load + labels → training table

import numpy as np
import pandas as pd

RUN = "run01"          # or "flat02"
WINDOW = 5.0

feat = pd.read_csv(f"seasonal/features_{RUN}.csv")
loc  = pd.read_csv(f"seasonal/locust_{RUN}.csv")
atk  = pd.read_csv(f"seasonal/attacks_{RUN}.csv")

# Downsample Locust (1 s) to 5-s windows
loc["window_start"] = (loc["ts"] // WINDOW) * WINDOW
loc5 = loc.groupby("window_start").agg(
    users_mean=("users", "mean"),
    rps=("current_rps", "mean"),
    p95=("response_time_percentile_0_95", "mean"),
).reset_index()

df = feat.merge(loc5, on="window_start", how="left")

# Label: window overlaps an attack on the same pod
df["label"] = 0
for _, a in atk.iterrows():
    mask = (
        (df["window_start"] < a["end_ts"]) &
        (df["window_start"] + WINDOW > a["start_ts"]) &
        (df["pod_name"].str.contains(a["name"].split("_")[0], na=False))
    )
    df.loc[mask, "label"] = 1

Step 2 — Train M1 (syscalls only)

from sklearn.ensemble import IsolationForest

FEAT_M1 = [c for c in df.columns if c.startswith("count_") or
           c in ("total_syscalls", "unique_syscalls", "entropy")]

# Temporal split: first half clean windows = train
split_ts = df.loc[df["label"] == 0, "window_start"].median()
train = df[(df["label"] == 0) & (df["window_start"] <= split_ts)]
test  = df[~((df["label"] == 0) & (df["window_start"] <= split_ts))]

# Per-pod z-score normalisation
pod_mean = train.groupby("pod_name")[FEAT_M1].mean()
pod_std  = train.groupby("pod_name")[FEAT_M1].std().replace(0, 1)

def normalise(rows, feat_cols):
    out = rows.copy()
    for pod, grp in rows.groupby("pod_name"):
        mu = pod_mean.loc[pod] if pod in pod_mean.index else pod_mean.mean()
        sd = pod_std.loc[pod]  if pod in pod_std.index  else pod_std.mean()
        out.loc[grp.index, feat_cols] = (grp[feat_cols] - mu) / sd
    return out

train_n = normalise(train, FEAT_M1)
test_n  = normalise(test,  FEAT_M1)

contamination = float(test["label"].mean())
m1 = IsolationForest(n_estimators=400, contamination=contamination, random_state=42)
m1.fit(train_n[FEAT_M1])

Step 3 — Train M2 (add load features)

FEAT_M2 = FEAT_M1 + ["rps", "p95"]

train_n2 = normalise(train, FEAT_M2)
test_n2  = normalise(test,  FEAT_M2)

m2 = IsolationForest(n_estimators=400, contamination=contamination, random_state=42)
m2.fit(train_n2[FEAT_M2])

Step 4 — Evaluate

from sklearn.metrics import roc_auc_score

for name, model, feat_cols, data in [
    ("M1", m1, FEAT_M1, test_n),
    ("M2", m2, FEAT_M2, test_n2),
]:
    scores = model.decision_function(data[feat_cols])
    roc = roc_auc_score(data["label"], scores)
    print(f"{name}: ROC-AUC = {roc:.3f}")

Expected output (seasonal run01): M1: ROC-AUC = 0.825, M2: ROC-AUC = 0.849

Detector

Isolation Forest (scikit-learn), temporal train/test split (cycles 1–2 train, cycles 3–5 test). Contamination: 0.042 (per-pod), 0.40 (global). Pre-trained models available at: jniecko/isolation-forest-k8s-ebpf

Feature Schema (features_*.csv)

Column Description
timestamp Window start (Unix seconds)
pod_name Pod identifier (per-pod variants)
count_<event> Count of each Tracee event in the 5-s window
total_syscalls Sum of all event counts
unique_syscalls Number of distinct event types
entropy Shannon entropy of the event distribution
label 1 = attack window, 0 = normal

Citation

In progress

License

CC BY 4.0

Downloads last month
319