pyToshka commited on
Commit
ca2b8f8
·
verified ·
1 Parent(s): 18056bf

Upload dataset - Session upload_1759218637

Browse files
Files changed (8) hide show
  1. .gitattributes +2 -0
  2. README.md +532 -0
  3. data_files.json +7 -0
  4. metadata.json +571 -0
  5. train.csv +3 -0
  6. train.jsonl +3 -0
  7. train.parquet +3 -0
  8. upload_manifest.json +15 -0
.gitattributes CHANGED
@@ -57,3 +57,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
 
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
60
+ train.csv filter=lfs diff=lfs merge=lfs -text
61
+ train.jsonl filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,532 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ language:
3
+ - en
4
+ task_categories:
5
+ - tabular-classification
6
+ - other
7
+ task_ids:
8
+ - tabular-multi-class-classification
9
+ - multi-class-classification
10
+ pretty_name: Honeypot Cybersecurity Dataset
11
+ size_categories:
12
+ - 100K<n<1M
13
+ source_datasets:
14
+ - original
15
+ license: bsd-3-clause
16
+ tags:
17
+ - cybersecurity
18
+ - honeypot
19
+ - threat-detection
20
+ - network-security
21
+ - intrusion-detection
22
+ - tabular
23
+ - security
24
+ - anomaly-detection
25
+ - classification
26
+ multilinguality:
27
+ - monolingual
28
+ annotations_creators:
29
+ - machine-generated
30
+ paperswithcode_id: null
31
+ dataset_info:
32
+ features:
33
+ - name: payload
34
+ dtype: string
35
+ - name: dest_ip
36
+ dtype: string
37
+ - name: metadata
38
+ dtype: string
39
+ - name: src_ip
40
+ dtype: string
41
+ - name: "@timestamp"
42
+ dtype: string
43
+ - name: honeypot_hostname
44
+ dtype: string
45
+ - name: dest_port
46
+ dtype: int64
47
+ - name: in_iface
48
+ dtype: string
49
+ - name: pkt_src
50
+ dtype: string
51
+ - name: geoip_ext
52
+ dtype: string
53
+ - name: proto
54
+ dtype: string
55
+ - name: honeypot_ip_int
56
+ dtype: string
57
+ - name: event_type
58
+ dtype: string
59
+ - name: alert
60
+ dtype: string
61
+ - name: direction
62
+ dtype: string
63
+ - name: geoip
64
+ dtype: string
65
+ - name: host
66
+ dtype: string
67
+ - name: type
68
+ dtype: string
69
+ - name: payload_printable
70
+ dtype: string
71
+ - name: "@version"
72
+ dtype: string
73
+ - name: flow
74
+ dtype: string
75
+ - name: src_port
76
+ dtype: string
77
+ - name: honeypot_ip_ext
78
+ dtype: string
79
+ - name: stream
80
+ dtype: string
81
+ - name: flow_id
82
+ dtype: string
83
+ - name: timestamp
84
+ dtype: string
85
+ - name: mitre_techniques
86
+ dtype: string
87
+ - name: attack_vectors
88
+ dtype: string
89
+ - name: mitre_tactic
90
+ dtype: string
91
+ - name: mitre_technique
92
+ dtype: string
93
+ - name: confidence_score
94
+ dtype: string
95
+ - name: is_malicious
96
+ dtype: bool
97
+ - name: severity
98
+ dtype: string
99
+ - name: primary_label
100
+ dtype: string
101
+ - name: subject
102
+ dtype: string
103
+ - name: os
104
+ dtype: string
105
+ - name: dist
106
+ dtype: string
107
+ - name: mod
108
+ dtype: string
109
+ - name: params
110
+ dtype: string
111
+ - name: raw_sig
112
+ dtype: string
113
+ - name: rdp
114
+ dtype: string
115
+ - name: tags
116
+ dtype: string
117
+ - name: app_proto
118
+ dtype: string
119
+ - name: tx_guessed
120
+ dtype: string
121
+ - name: tx_id
122
+ dtype: string
123
+ - name: fatt_ssh
124
+ dtype: string
125
+ - name: protocol
126
+ dtype: string
127
+ - name: link
128
+ dtype: string
129
+ - name: raw_mtu
130
+ dtype: string
131
+ - name: ssh
132
+ dtype: string
133
+ - name: app_proto_tc
134
+ dtype: string
135
+ - name: proxy_connection
136
+ dtype: string
137
+ - name: download_count
138
+ dtype: string
139
+ - name: is_virtual
140
+ dtype: string
141
+ - name: download_tries
142
+ dtype: string
143
+ - name: operation_mode
144
+ dtype: string
145
+ - name: attack_connection
146
+ dtype: string
147
+ - name: ip_rep
148
+ dtype: string
149
+ - name: start_time
150
+ dtype: string
151
+ - name: end_time
152
+ dtype: string
153
+ - name: downloads
154
+ dtype: string
155
+ - name: tcp
156
+ dtype: string
157
+ - name: uptime
158
+ dtype: string
159
+ - name: raw_freq
160
+ dtype: string
161
+ - name: mstshash
162
+ dtype: string
163
+ - name: action
164
+ dtype: string
165
+ - name: data
166
+ dtype: string
167
+ - name: anomaly
168
+ dtype: string
169
+ - name: lang
170
+ dtype: string
171
+ - name: app
172
+ dtype: string
173
+ - name: smb
174
+ dtype: string
175
+ - name: fatt_tls
176
+ dtype: string
177
+ - name: message
178
+ dtype: string
179
+ - name: fatt_rdp
180
+ dtype: string
181
+ - name: tls
182
+ dtype: string
183
+ - name: reason
184
+ dtype: string
185
+ - name: raw_hits
186
+ dtype: string
187
+ - name: level
188
+ dtype: string
189
+ - name: service
190
+ dtype: string
191
+ - name: status
192
+ dtype: string
193
+ - name: output
194
+ dtype: string
195
+ - name: input
196
+ dtype: string
197
+ - name: username
198
+ dtype: string
199
+ - name: environ
200
+ dtype: string
201
+ - name: session
202
+ dtype: string
203
+ - name: msg
204
+ dtype: string
205
+ - name: session_duration
206
+ dtype: float64
207
+ - name: client_version
208
+ dtype: string
209
+ - name: password
210
+ dtype: string
211
+ - name: client
212
+ dtype: string
213
+ - name: http
214
+ dtype: string
215
+ - name: smtp
216
+ dtype: string
217
+ - name: fileinfo
218
+ dtype: string
219
+ - name: sensorName
220
+ dtype: string
221
+ - name: response.headers.Server
222
+ dtype: string
223
+ - name: request.bodySha256
224
+ dtype: string
225
+ - name: response.metadata.model
226
+ dtype: string
227
+ - name: response.metadata.generationSource
228
+ dtype: string
229
+ - name: "request.headers.Accept-Encoding"
230
+ dtype: string
231
+ - name: request.headers.sorted
232
+ dtype: string
233
+ - name: request.userAgent
234
+ dtype: string
235
+ - name: response.body
236
+ dtype: string
237
+ - name: request.body
238
+ dtype: string
239
+ - name: request.requestURI
240
+ dtype: string
241
+ - name: hostname
242
+ dtype: string
243
+ - name: response.metadata.temperature
244
+ dtype: string
245
+ - name: "response.headers.Content-Type"
246
+ dtype: string
247
+ - name: request.headers.Accept
248
+ dtype: string
249
+ - name: request.method
250
+ dtype: string
251
+ - name: "request.headers.User-Agent"
252
+ dtype: string
253
+ - name: request.protocol
254
+ dtype: string
255
+ - name: request.headers.sortedSha256
256
+ dtype: string
257
+ - name: response.metadata.provider
258
+ dtype: string
259
+ - name: fatt_http
260
+ dtype: string
261
+ - name: eventid
262
+ dtype: string
263
+ - name: sensor
264
+ dtype: string
265
+ - name: files
266
+ dtype: string
267
+ - name: shasum
268
+ dtype: string
269
+ - name: outfile
270
+ dtype: string
271
+ - name: filename
272
+ dtype: string
273
+ - name: src_url
274
+ dtype: string
275
+ - name: ftp
276
+ dtype: string
277
+ - name: icmp_type
278
+ dtype: string
279
+ - name: icmp_code
280
+ dtype: string
281
+ - name: mqtt
282
+ dtype: string
283
+ - name: pgsql
284
+ dtype: string
285
+ - name: request.headers.Connection
286
+ dtype: string
287
+ - name: response.headers.Connection
288
+ dtype: string
289
+ - name: "request.headers.X-Support-Http-Auth"
290
+ dtype: string
291
+ - name: "request.headers.X-Transcend-Version"
292
+ dtype: string
293
+ - name: dcerpc
294
+ dtype: string
295
+ - name: app_proto_ts
296
+ dtype: string
297
+ - name: "request.headers.Content-Length"
298
+ dtype: string
299
+ - name: "response.headers.X-Powered-By"
300
+ dtype: string
301
+ - name: public_ip
302
+ dtype: string
303
+ - name: response
304
+ dtype: string
305
+ - name: request
306
+ dtype: string
307
+ - name: data_type
308
+ dtype: string
309
+ - name: sensorid
310
+ dtype: string
311
+ - name: id
312
+ dtype: string
313
+ - name: "request.headers.Content-Type"
314
+ dtype: string
315
+ - name: request.headers.Origin
316
+ dtype: string
317
+ - name: "request.headers.Accept-Language"
318
+ dtype: string
319
+ - name: "request.headers.Upgrade-Insecure-Requests"
320
+ dtype: string
321
+ - name: app_name
322
+ dtype: string
323
+ - name: transport_type
324
+ dtype: string
325
+ - name: sip_user_agent
326
+ dtype: string
327
+ - name: sip_method
328
+ dtype: string
329
+ - name: created_by_node_id
330
+ dtype: string
331
+ - name: called_number
332
+ dtype: string
333
+ - name: app_version
334
+ dtype: string
335
+ - name: sip_message
336
+ dtype: string
337
+ - name: event_uuid
338
+ dtype: string
339
+ - name: collected_method
340
+ dtype: string
341
+ - name: fileinfo.state
342
+ dtype: string
343
+ - name: http.http_method
344
+ dtype: string
345
+ - name: fileinfo.filename
346
+ dtype: string
347
+ - name: "request.headers.Accept-Charset"
348
+ dtype: string
349
+ - name: "user-agent_browser"
350
+ dtype: string
351
+ - name: trapped
352
+ dtype: string
353
+ - name: "user-agent"
354
+ dtype: string
355
+ - name: request_method
356
+ dtype: string
357
+ - name: request_uri
358
+ dtype: string
359
+ - name: header_connection
360
+ dtype: string
361
+ - name: "user-agent_os"
362
+ dtype: string
363
+ - name: "request.headers.Cache-Control"
364
+ dtype: string
365
+ - name: request.headers.Pragma
366
+ dtype: string
367
+ - name: "user-agent_browser_version"
368
+ dtype: string
369
+ - name: "header_user-agent"
370
+ dtype: string
371
+ - name: "header_accept-encoding"
372
+ dtype: string
373
+ - name: header_accept
374
+ dtype: string
375
+ - name: duration
376
+ dtype: string
377
+ - name: "header_content-type"
378
+ dtype: string
379
+ - name: "user-agent_device_model"
380
+ dtype: string
381
+ - name: "user-agent_device_brand"
382
+ dtype: string
383
+ - name: "user-agent_os_version"
384
+ dtype: string
385
+ - name: "request.headers.Keep-Alive"
386
+ dtype: string
387
+ - name: trapped_for
388
+ dtype: string
389
+ - name: "request.headers.X-Requested-With"
390
+ dtype: string
391
+ - name: commands
392
+ dtype: string
393
+ splits:
394
+ - name: train
395
+ num_bytes: 2614347058
396
+ num_examples: 230192
397
+ download_size: 2614347058
398
+ dataset_size: 2614347058
399
+ config_name: default
400
+ ---
401
+
402
+ # attacks-monthly
403
+
404
+ ## Dataset Description
405
+
406
+ This dataset contains cybersecurity events collected from honeypot infrastructure.
407
+
408
+ The data has been processed and feature-engineered for machine learning applications in threat detection and security analytics.
409
+
410
+ ## Feature Categories
411
+
412
+ ### Network Features
413
+ - Connection flow statistics (bytes, packets, duration)
414
+ - Protocol-specific metrics
415
+ - Geographic information
416
+ - IP reputation data
417
+
418
+ ### Behavioral Features
419
+ - Session patterns and command sequences
420
+ - User-agent analysis
421
+ - Attack pattern identification
422
+ - Protocol fingerprinting
423
+
424
+ ### Temporal Features
425
+ - Time-based aggregations
426
+ - Frequency analysis
427
+ - Campaign detection indicators
428
+ - Attack timing patterns
429
+
430
+ ### Security Labels
431
+ - MITRE ATT&CK technique mappings
432
+ - Alert severity classifications
433
+ - Automatic threat categorization
434
+ - Binary maliciousness indicators
435
+
436
+ ## Usage Example
437
+
438
+ ```python
439
+ from datasets import load_dataset
440
+
441
+ # Load the dataset
442
+ dataset = load_dataset("pyToshka/attacks-monthly")
443
+ train_data = dataset["train"]
444
+
445
+ # Basic exploration
446
+ print("Dataset features:", list(train_data.features.keys()))
447
+ print("Total samples:", len(train_data))
448
+
449
+ from collections import Counter
450
+
451
+ # Example: Filter RDP attacks
452
+ rdp_events = train_data.filter(lambda x: x['app_proto'] == 'rdp')
453
+ print("RDP events:", len(rdp_events))
454
+
455
+ # Example: Analyze attack vectors
456
+ if len(rdp_events) > 0:
457
+ attack_vectors = Counter([event['attack_vectors'] for event in rdp_events if event['attack_vectors']])
458
+ print("RDP Attack vectors:")
459
+ for vector, count in attack_vectors.most_common():
460
+ print(f" {vector}: {count}")
461
+
462
+ # Example: Analyze protocol distribution
463
+ protocols = Counter([event['app_proto'] for event in train_data if event['app_proto']])
464
+ print("Protocol distribution:")
465
+ for proto, count in protocols.most_common():
466
+ print(f" {proto if proto else '(empty)'}: {count}")
467
+
468
+ # Example: Malicious events analysis
469
+ malicious_count = sum(1 for event in train_data if event['is_malicious'])
470
+ print(f"Malicious events: {malicious_count}/{len(train_data)} ({malicious_count/len(train_data)*100:.1f}%)")
471
+ ```
472
+
473
+ ## Data Fields
474
+
475
+ The dataset contains 180 features across several categories:
476
+
477
+ ### Network Features
478
+ - `dest_ip`: Network-related information
479
+ - `src_ip`: Network-related information
480
+ - `dest_port`: Network-related information
481
+ - `geoip_ext`: Network-related information
482
+ - `honeypot_ip_int`: Network-related information
483
+ - ... and 14 more network features
484
+
485
+ ### Behavioral Features
486
+ - `username`: Behavioral analysis data
487
+ - `session`: Behavioral analysis data
488
+ - `session_duration`: Behavioral analysis data
489
+ - `request.userAgent`: Behavioral analysis data
490
+ - `request.headers.User-Agent`: Behavioral analysis data
491
+ - ... and 11 more behavioral features
492
+
493
+ ### Temporal Features
494
+ - `@timestamp`: Time-based information
495
+ - `timestamp`: Time-based information
496
+ - `start_time`: Time-based information
497
+ - `end_time`: Time-based information
498
+ - `uptime`: Time-based information
499
+ - ... and 2 more temporal features
500
+
501
+ ### Security Features
502
+ - `alert`: Security and threat intelligence
503
+ - `mitre_techniques`: Security and threat intelligence
504
+ - `attack_vectors`: Security and threat intelligence
505
+ - `mitre_tactic`: Security and threat intelligence
506
+ - `mitre_technique`: Security and threat intelligence
507
+ - ... and 2 more security features
508
+
509
+ ## Data Splits
510
+
511
+ | Split | Examples |
512
+ |-------|----------|
513
+ | train | 230,192 |
514
+
515
+ ## Dataset Statistics
516
+
517
+ - **Total size**: ~2493.2 MB
518
+ - **Average record size**: ~11357 bytes
519
+ - **Feature completeness**: 100.0%
520
+
521
+ ## Ethical Considerations
522
+
523
+ This dataset contains real honeypot data representing actual attack attempts. Users should:
524
+
525
+ - **Privacy**: Respect anonymization measures implemented in the dataset
526
+ - **Research Use**: Use data only for legitimate cybersecurity research and education
527
+ - **Responsible Disclosure**: Follow responsible disclosure practices for any findings
528
+ - **Legal Compliance**: Comply with applicable laws and regulations in your jurisdiction
529
+ - **No Reidentification**: Do not attempt to identify or contact attackers
530
+ - **Defensive Purpose**: Use insights for defensive security improvements only
531
+
532
+
data_files.json ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ {
2
+ "train": {
3
+ "csv": "train.csv",
4
+ "parquet": "train.parquet",
5
+ "jsonl": "train.jsonl"
6
+ }
7
+ }
metadata.json ADDED
@@ -0,0 +1,571 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "dataset_info": {
3
+ "name": "attacks-monthly",
4
+ "version": "1.0.0",
5
+ "description": "Cybersecurity dataset from honeypot infrastructure",
6
+ "total_samples": 230192,
7
+ "features": 180,
8
+ "creation_timestamp": "2025-09-30T07:49:21.702377+00:00",
9
+ "data_source": "Honeypot Infrastructure",
10
+ "honeypot_types": {},
11
+ "time_range": {
12
+ "start": "",
13
+ "end": "2025-09-29T23:59:57.152601+00:00"
14
+ }
15
+ },
16
+ "statistics": {
17
+ "total_events": 300000,
18
+ "successful_extractions": 300000,
19
+ "feature_extraction_time": 287.682376,
20
+ "dataset_creation_time": 0,
21
+ "quality_score": 0.0
22
+ },
23
+ "feature_schema": {
24
+ "payload": "object",
25
+ "dest_ip": "object",
26
+ "metadata": "object",
27
+ "src_ip": "object",
28
+ "@timestamp": "object",
29
+ "honeypot_hostname": "object",
30
+ "dest_port": "int64",
31
+ "in_iface": "object",
32
+ "pkt_src": "object",
33
+ "geoip_ext": "object",
34
+ "proto": "object",
35
+ "honeypot_ip_int": "object",
36
+ "event_type": "object",
37
+ "alert": "object",
38
+ "direction": "object",
39
+ "geoip": "object",
40
+ "host": "object",
41
+ "type": "object",
42
+ "payload_printable": "object",
43
+ "@version": "object",
44
+ "flow": "object",
45
+ "src_port": "object",
46
+ "honeypot_ip_ext": "object",
47
+ "stream": "object",
48
+ "flow_id": "object",
49
+ "timestamp": "object",
50
+ "mitre_techniques": "object",
51
+ "attack_vectors": "object",
52
+ "mitre_tactic": "object",
53
+ "mitre_technique": "object",
54
+ "confidence_score": "object",
55
+ "is_malicious": "bool",
56
+ "severity": "object",
57
+ "primary_label": "object",
58
+ "subject": "object",
59
+ "os": "object",
60
+ "dist": "object",
61
+ "mod": "object",
62
+ "params": "object",
63
+ "raw_sig": "object",
64
+ "rdp": "object",
65
+ "tags": "object",
66
+ "app_proto": "object",
67
+ "tx_guessed": "object",
68
+ "tx_id": "object",
69
+ "fatt_ssh": "object",
70
+ "protocol": "object",
71
+ "link": "object",
72
+ "raw_mtu": "object",
73
+ "ssh": "object",
74
+ "app_proto_tc": "object",
75
+ "proxy_connection": "object",
76
+ "download_count": "object",
77
+ "is_virtual": "object",
78
+ "download_tries": "object",
79
+ "operation_mode": "object",
80
+ "attack_connection": "object",
81
+ "ip_rep": "object",
82
+ "start_time": "object",
83
+ "end_time": "object",
84
+ "downloads": "object",
85
+ "tcp": "object",
86
+ "uptime": "object",
87
+ "raw_freq": "object",
88
+ "mstshash": "object",
89
+ "action": "object",
90
+ "data": "object",
91
+ "anomaly": "object",
92
+ "lang": "object",
93
+ "app": "object",
94
+ "smb": "object",
95
+ "fatt_tls": "object",
96
+ "message": "object",
97
+ "fatt_rdp": "object",
98
+ "tls": "object",
99
+ "reason": "object",
100
+ "raw_hits": "object",
101
+ "level": "object",
102
+ "service": "object",
103
+ "status": "object",
104
+ "output": "object",
105
+ "input": "object",
106
+ "username": "object",
107
+ "environ": "object",
108
+ "session": "object",
109
+ "msg": "object",
110
+ "session_duration": "float64",
111
+ "client_version": "object",
112
+ "password": "object",
113
+ "client": "object",
114
+ "http": "object",
115
+ "smtp": "object",
116
+ "fileinfo": "object",
117
+ "sensorName": "object",
118
+ "response.headers.Server": "object",
119
+ "request.bodySha256": "object",
120
+ "response.metadata.model": "object",
121
+ "response.metadata.generationSource": "object",
122
+ "request.headers.Accept-Encoding": "object",
123
+ "request.headers.sorted": "object",
124
+ "request.userAgent": "object",
125
+ "response.body": "object",
126
+ "request.body": "object",
127
+ "request.requestURI": "object",
128
+ "hostname": "object",
129
+ "response.metadata.temperature": "object",
130
+ "response.headers.Content-Type": "object",
131
+ "request.headers.Accept": "object",
132
+ "request.method": "object",
133
+ "request.headers.User-Agent": "object",
134
+ "request.protocol": "object",
135
+ "request.headers.sortedSha256": "object",
136
+ "response.metadata.provider": "object",
137
+ "fatt_http": "object",
138
+ "eventid": "object",
139
+ "sensor": "object",
140
+ "files": "object",
141
+ "shasum": "object",
142
+ "outfile": "object",
143
+ "filename": "object",
144
+ "src_url": "object",
145
+ "ftp": "object",
146
+ "icmp_type": "object",
147
+ "icmp_code": "object",
148
+ "mqtt": "object",
149
+ "pgsql": "object",
150
+ "request.headers.Connection": "object",
151
+ "response.headers.Connection": "object",
152
+ "request.headers.X-Support-Http-Auth": "object",
153
+ "request.headers.X-Transcend-Version": "object",
154
+ "dcerpc": "object",
155
+ "app_proto_ts": "object",
156
+ "request.headers.Content-Length": "object",
157
+ "response.headers.X-Powered-By": "object",
158
+ "public_ip": "object",
159
+ "response": "object",
160
+ "request": "object",
161
+ "data_type": "object",
162
+ "sensorid": "object",
163
+ "id": "object",
164
+ "request.headers.Content-Type": "object",
165
+ "request.headers.Origin": "object",
166
+ "request.headers.Accept-Language": "object",
167
+ "request.headers.Upgrade-Insecure-Requests": "object",
168
+ "app_name": "object",
169
+ "transport_type": "object",
170
+ "sip_user_agent": "object",
171
+ "sip_method": "object",
172
+ "created_by_node_id": "object",
173
+ "called_number": "object",
174
+ "app_version": "object",
175
+ "sip_message": "object",
176
+ "event_uuid": "object",
177
+ "collected_method": "object",
178
+ "fileinfo.state": "object",
179
+ "http.http_method": "object",
180
+ "fileinfo.filename": "object",
181
+ "request.headers.Accept-Charset": "object",
182
+ "user-agent_browser": "object",
183
+ "trapped": "object",
184
+ "user-agent": "object",
185
+ "request_method": "object",
186
+ "request_uri": "object",
187
+ "header_connection": "object",
188
+ "user-agent_os": "object",
189
+ "request.headers.Cache-Control": "object",
190
+ "request.headers.Pragma": "object",
191
+ "user-agent_browser_version": "object",
192
+ "header_user-agent": "object",
193
+ "header_accept-encoding": "object",
194
+ "header_accept": "object",
195
+ "duration": "object",
196
+ "header_content-type": "object",
197
+ "user-agent_device_model": "object",
198
+ "user-agent_device_brand": "object",
199
+ "user-agent_os_version": "object",
200
+ "request.headers.Keep-Alive": "object",
201
+ "trapped_for": "object",
202
+ "request.headers.X-Requested-With": "object",
203
+ "commands": "object"
204
+ },
205
+ "quality_metrics": {
206
+ "completeness": {
207
+ "payload": 1.0,
208
+ "dest_ip": 1.0,
209
+ "metadata": 1.0,
210
+ "src_ip": 1.0,
211
+ "@timestamp": 1.0,
212
+ "honeypot_hostname": 1.0,
213
+ "dest_port": 1.0,
214
+ "in_iface": 1.0,
215
+ "pkt_src": 1.0,
216
+ "geoip_ext": 1.0,
217
+ "proto": 1.0,
218
+ "honeypot_ip_int": 1.0,
219
+ "event_type": 1.0,
220
+ "alert": 1.0,
221
+ "direction": 1.0,
222
+ "geoip": 1.0,
223
+ "host": 1.0,
224
+ "type": 1.0,
225
+ "payload_printable": 1.0,
226
+ "@version": 1.0,
227
+ "flow": 1.0,
228
+ "src_port": 1.0,
229
+ "honeypot_ip_ext": 1.0,
230
+ "stream": 1.0,
231
+ "flow_id": 1.0,
232
+ "timestamp": 1.0,
233
+ "mitre_techniques": 1.0,
234
+ "attack_vectors": 1.0,
235
+ "mitre_tactic": 1.0,
236
+ "mitre_technique": 1.0,
237
+ "confidence_score": 1.0,
238
+ "is_malicious": 1.0,
239
+ "severity": 1.0,
240
+ "primary_label": 1.0,
241
+ "subject": 1.0,
242
+ "os": 1.0,
243
+ "dist": 1.0,
244
+ "mod": 1.0,
245
+ "params": 1.0,
246
+ "raw_sig": 1.0,
247
+ "rdp": 1.0,
248
+ "tags": 1.0,
249
+ "app_proto": 1.0,
250
+ "tx_guessed": 1.0,
251
+ "tx_id": 1.0,
252
+ "fatt_ssh": 1.0,
253
+ "protocol": 1.0,
254
+ "link": 1.0,
255
+ "raw_mtu": 1.0,
256
+ "ssh": 1.0,
257
+ "app_proto_tc": 1.0,
258
+ "proxy_connection": 1.0,
259
+ "download_count": 1.0,
260
+ "is_virtual": 1.0,
261
+ "download_tries": 1.0,
262
+ "operation_mode": 1.0,
263
+ "attack_connection": 1.0,
264
+ "ip_rep": 1.0,
265
+ "start_time": 1.0,
266
+ "end_time": 1.0,
267
+ "downloads": 1.0,
268
+ "tcp": 1.0,
269
+ "uptime": 1.0,
270
+ "raw_freq": 1.0,
271
+ "mstshash": 1.0,
272
+ "action": 1.0,
273
+ "data": 1.0,
274
+ "anomaly": 1.0,
275
+ "lang": 1.0,
276
+ "app": 1.0,
277
+ "smb": 1.0,
278
+ "fatt_tls": 1.0,
279
+ "message": 1.0,
280
+ "fatt_rdp": 1.0,
281
+ "tls": 1.0,
282
+ "reason": 1.0,
283
+ "raw_hits": 1.0,
284
+ "level": 1.0,
285
+ "service": 1.0,
286
+ "status": 1.0,
287
+ "output": 1.0,
288
+ "input": 1.0,
289
+ "username": 1.0,
290
+ "environ": 1.0,
291
+ "session": 1.0,
292
+ "msg": 1.0,
293
+ "session_duration": 1.0,
294
+ "client_version": 1.0,
295
+ "password": 1.0,
296
+ "client": 1.0,
297
+ "http": 1.0,
298
+ "smtp": 1.0,
299
+ "fileinfo": 1.0,
300
+ "sensorName": 1.0,
301
+ "response.headers.Server": 1.0,
302
+ "request.bodySha256": 1.0,
303
+ "response.metadata.model": 1.0,
304
+ "response.metadata.generationSource": 1.0,
305
+ "request.headers.Accept-Encoding": 1.0,
306
+ "request.headers.sorted": 1.0,
307
+ "request.userAgent": 1.0,
308
+ "response.body": 1.0,
309
+ "request.body": 1.0,
310
+ "request.requestURI": 1.0,
311
+ "hostname": 1.0,
312
+ "response.metadata.temperature": 1.0,
313
+ "response.headers.Content-Type": 1.0,
314
+ "request.headers.Accept": 1.0,
315
+ "request.method": 1.0,
316
+ "request.headers.User-Agent": 1.0,
317
+ "request.protocol": 1.0,
318
+ "request.headers.sortedSha256": 1.0,
319
+ "response.metadata.provider": 1.0,
320
+ "fatt_http": 1.0,
321
+ "eventid": 1.0,
322
+ "sensor": 1.0,
323
+ "files": 1.0,
324
+ "shasum": 1.0,
325
+ "outfile": 1.0,
326
+ "filename": 1.0,
327
+ "src_url": 1.0,
328
+ "ftp": 1.0,
329
+ "icmp_type": 1.0,
330
+ "icmp_code": 1.0,
331
+ "mqtt": 1.0,
332
+ "pgsql": 1.0,
333
+ "request.headers.Connection": 1.0,
334
+ "response.headers.Connection": 1.0,
335
+ "request.headers.X-Support-Http-Auth": 1.0,
336
+ "request.headers.X-Transcend-Version": 1.0,
337
+ "dcerpc": 1.0,
338
+ "app_proto_ts": 1.0,
339
+ "request.headers.Content-Length": 1.0,
340
+ "response.headers.X-Powered-By": 1.0,
341
+ "public_ip": 1.0,
342
+ "response": 1.0,
343
+ "request": 1.0,
344
+ "data_type": 1.0,
345
+ "sensorid": 1.0,
346
+ "id": 1.0,
347
+ "request.headers.Content-Type": 1.0,
348
+ "request.headers.Origin": 1.0,
349
+ "request.headers.Accept-Language": 1.0,
350
+ "request.headers.Upgrade-Insecure-Requests": 1.0,
351
+ "app_name": 1.0,
352
+ "transport_type": 1.0,
353
+ "sip_user_agent": 1.0,
354
+ "sip_method": 1.0,
355
+ "created_by_node_id": 1.0,
356
+ "called_number": 1.0,
357
+ "app_version": 1.0,
358
+ "sip_message": 1.0,
359
+ "event_uuid": 1.0,
360
+ "collected_method": 1.0,
361
+ "fileinfo.state": 1.0,
362
+ "http.http_method": 1.0,
363
+ "fileinfo.filename": 1.0,
364
+ "request.headers.Accept-Charset": 1.0,
365
+ "user-agent_browser": 1.0,
366
+ "trapped": 1.0,
367
+ "user-agent": 1.0,
368
+ "request_method": 1.0,
369
+ "request_uri": 1.0,
370
+ "header_connection": 1.0,
371
+ "user-agent_os": 1.0,
372
+ "request.headers.Cache-Control": 1.0,
373
+ "request.headers.Pragma": 1.0,
374
+ "user-agent_browser_version": 1.0,
375
+ "header_user-agent": 1.0,
376
+ "header_accept-encoding": 1.0,
377
+ "header_accept": 1.0,
378
+ "duration": 1.0,
379
+ "header_content-type": 1.0,
380
+ "user-agent_device_model": 1.0,
381
+ "user-agent_device_brand": 1.0,
382
+ "user-agent_os_version": 1.0,
383
+ "request.headers.Keep-Alive": 1.0,
384
+ "trapped_for": 1.0,
385
+ "request.headers.X-Requested-With": 1.0,
386
+ "commands": 1.0
387
+ },
388
+ "uniqueness": {
389
+ "payload": 0.008054146104121777,
390
+ "dest_ip": 5.213039549593383e-05,
391
+ "metadata": 0.00035188016959755334,
392
+ "src_ip": 0.009565927573503857,
393
+ "@timestamp": 0.38097761868353375,
394
+ "honeypot_hostname": 0.0012989156877736847,
395
+ "dest_port": 0.027498783624105096,
396
+ "in_iface": 8.688399249322305e-06,
397
+ "pkt_src": 1.737679849864461e-05,
398
+ "geoip_ext": 0.00012598178911517343,
399
+ "proto": 1.3032598873983458e-05,
400
+ "honeypot_ip_int": 0.2727331966358518,
401
+ "event_type": 7.385139361923959e-05,
402
+ "alert": 0.005847292694793911,
403
+ "direction": 1.3032598873983458e-05,
404
+ "geoip": 0.01993118787794537,
405
+ "host": 0.0012989156877736847,
406
+ "type": 5.6474595120594984e-05,
407
+ "payload_printable": 0.008036769305623132,
408
+ "@version": 4.344199624661153e-06,
409
+ "flow": 0.20429033154931536,
410
+ "src_port": 0.07622767081392924,
411
+ "honeypot_ip_ext": 4.344199624661153e-06,
412
+ "stream": 1.3032598873983458e-05,
413
+ "flow_id": 0.11199781052338917,
414
+ "timestamp": 0.4248670674914854,
415
+ "mitre_techniques": 4.344199624661153e-06,
416
+ "attack_vectors": 4.344199624661153e-06,
417
+ "mitre_tactic": 4.344199624661153e-06,
418
+ "mitre_technique": 4.344199624661153e-06,
419
+ "confidence_score": 4.344199624661153e-06,
420
+ "is_malicious": 4.344199624661153e-06,
421
+ "severity": 4.344199624661153e-06,
422
+ "primary_label": 1.3032598873983458e-05,
423
+ "subject": 1.3032598873983458e-05,
424
+ "os": 6.950719399457844e-05,
425
+ "dist": 0.00013467018836449572,
426
+ "mod": 3.909779662195037e-05,
427
+ "params": 3.475359699728922e-05,
428
+ "raw_sig": 0.003736011677208591,
429
+ "rdp": 9.557239174254536e-05,
430
+ "tags": 1.3032598873983458e-05,
431
+ "app_proto": 6.0818794745256136e-05,
432
+ "tx_guessed": 8.688399249322305e-06,
433
+ "tx_id": 2.1720998123305763e-05,
434
+ "fatt_ssh": 0.0004952387572113714,
435
+ "protocol": 7.385139361923959e-05,
436
+ "link": 4.3441996246611526e-05,
437
+ "raw_mtu": 0.00013467018836449572,
438
+ "ssh": 0.00047786195871272677,
439
+ "app_proto_tc": 2.6065197747966916e-05,
440
+ "proxy_connection": 0.00012598178911517343,
441
+ "download_count": 8.688399249322305e-06,
442
+ "is_virtual": 8.688399249322305e-06,
443
+ "download_tries": 8.688399249322305e-06,
444
+ "operation_mode": 8.688399249322305e-06,
445
+ "attack_connection": 0.0053433655383332175,
446
+ "ip_rep": 2.6065197747966916e-05,
447
+ "start_time": 0.01013936192395913,
448
+ "end_time": 0.010165427121707097,
449
+ "downloads": 8.688399249322305e-06,
450
+ "tcp": 0.00350576909710155,
451
+ "uptime": 0.010734517272537708,
452
+ "raw_freq": 0.005334677139083895,
453
+ "mstshash": 8.688399249322305e-06,
454
+ "action": 2.1720998123305763e-05,
455
+ "data": 0.00014335858761381804,
456
+ "anomaly": 0.00017811218461110726,
457
+ "lang": 2.1720998123305763e-05,
458
+ "app": 2.6065197747966916e-05,
459
+ "smb": 0.0007732675331896851,
460
+ "fatt_tls": 0.0005039271564606937,
461
+ "message": 0.011477375408354765,
462
+ "fatt_rdp": 1.737679849864461e-05,
463
+ "tls": 0.0008949051226801974,
464
+ "reason": 0.00013467018836449572,
465
+ "raw_hits": 0.0005864669493292556,
466
+ "level": 1.3032598873983458e-05,
467
+ "service": 8.688399249322305e-06,
468
+ "status": 8.688399249322305e-06,
469
+ "output": 0.0010165427121707096,
470
+ "input": 0.000343191770348231,
471
+ "username": 0.000742858135817057,
472
+ "environ": 4.344199624661153e-06,
473
+ "session": 0.011238444428998401,
474
+ "msg": 3.0409397372628068e-05,
475
+ "session_duration": 4.344199624661153e-06,
476
+ "client_version": 1.737679849864461e-05,
477
+ "password": 0.002680371168415931,
478
+ "client": 5.213039549593383e-05,
479
+ "http": 0.002085215819837353,
480
+ "smtp": 1.3032598873983458e-05,
481
+ "fileinfo": 0.00014335858761381804,
482
+ "sensorName": 9.99165913672065e-05,
483
+ "response.headers.Server": 4.778619587127268e-05,
484
+ "request.bodySha256": 1.3032598873983458e-05,
485
+ "response.metadata.model": 8.688399249322305e-06,
486
+ "response.metadata.generationSource": 1.3032598873983458e-05,
487
+ "request.headers.Accept-Encoding": 3.0409397372628068e-05,
488
+ "request.headers.sorted": 7.385139361923959e-05,
489
+ "request.userAgent": 0.00011294919024118997,
490
+ "response.body": 5.213039549593383e-05,
491
+ "request.body": 8.688399249322305e-06,
492
+ "request.requestURI": 2.1720998123305763e-05,
493
+ "hostname": 9.557239174254536e-05,
494
+ "response.metadata.temperature": 8.688399249322305e-06,
495
+ "response.headers.Content-Type": 1.737679849864461e-05,
496
+ "request.headers.Accept": 3.0409397372628068e-05,
497
+ "request.method": 1.737679849864461e-05,
498
+ "request.headers.User-Agent": 0.00011294919024118997,
499
+ "request.protocol": 1.3032598873983458e-05,
500
+ "request.headers.sortedSha256": 7.819559324390075e-05,
501
+ "response.metadata.provider": 8.688399249322305e-06,
502
+ "fatt_http": 0.00023458677973170223,
503
+ "eventid": 2.6065197747966916e-05,
504
+ "sensor": 8.688399249322305e-06,
505
+ "files": 1.737679849864461e-05,
506
+ "shasum": 4.778619587127268e-05,
507
+ "outfile": 4.778619587127268e-05,
508
+ "filename": 2.1720998123305763e-05,
509
+ "src_url": 3.0409397372628068e-05,
510
+ "ftp": 0.00012163758949051227,
511
+ "icmp_type": 8.688399249322305e-06,
512
+ "icmp_code": 2.1720998123305763e-05,
513
+ "mqtt": 1.737679849864461e-05,
514
+ "pgsql": 1.737679849864461e-05,
515
+ "request.headers.Connection": 1.737679849864461e-05,
516
+ "response.headers.Connection": 8.688399249322305e-06,
517
+ "request.headers.X-Support-Http-Auth": 8.688399249322305e-06,
518
+ "request.headers.X-Transcend-Version": 8.688399249322305e-06,
519
+ "dcerpc": 8.688399249322305e-06,
520
+ "app_proto_ts": 8.688399249322305e-06,
521
+ "request.headers.Content-Length": 1.3032598873983458e-05,
522
+ "response.headers.X-Powered-By": 1.3032598873983458e-05,
523
+ "public_ip": 8.688399249322305e-06,
524
+ "response": 4.344199624661153e-06,
525
+ "request": 4.344199624661153e-06,
526
+ "data_type": 1.3032598873983458e-05,
527
+ "sensorid": 8.688399249322305e-06,
528
+ "id": 2.1720998123305763e-05,
529
+ "request.headers.Content-Type": 1.3032598873983458e-05,
530
+ "request.headers.Origin": 1.3032598873983458e-05,
531
+ "request.headers.Accept-Language": 3.909779662195037e-05,
532
+ "request.headers.Upgrade-Insecure-Requests": 8.688399249322305e-06,
533
+ "app_name": 8.688399249322305e-06,
534
+ "transport_type": 8.688399249322305e-06,
535
+ "sip_user_agent": 8.688399249322305e-06,
536
+ "sip_method": 8.688399249322305e-06,
537
+ "created_by_node_id": 8.688399249322305e-06,
538
+ "called_number": 8.688399249322305e-06,
539
+ "app_version": 8.688399249322305e-06,
540
+ "sip_message": 8.688399249322305e-06,
541
+ "event_uuid": 8.688399249322305e-06,
542
+ "collected_method": 8.688399249322305e-06,
543
+ "fileinfo.state": 8.688399249322305e-06,
544
+ "http.http_method": 8.688399249322305e-06,
545
+ "fileinfo.filename": 1.3032598873983458e-05,
546
+ "request.headers.Accept-Charset": 1.3032598873983458e-05,
547
+ "user-agent_browser": 1.737679849864461e-05,
548
+ "trapped": 1.3032598873983458e-05,
549
+ "user-agent": 2.1720998123305763e-05,
550
+ "request_method": 8.688399249322305e-06,
551
+ "request_uri": 9.557239174254536e-05,
552
+ "header_connection": 8.688399249322305e-06,
553
+ "user-agent_os": 1.3032598873983458e-05,
554
+ "request.headers.Cache-Control": 8.688399249322305e-06,
555
+ "request.headers.Pragma": 8.688399249322305e-06,
556
+ "user-agent_browser_version": 1.3032598873983458e-05,
557
+ "header_user-agent": 2.1720998123305763e-05,
558
+ "header_accept-encoding": 8.688399249322305e-06,
559
+ "header_accept": 1.3032598873983458e-05,
560
+ "duration": 3.0409397372628068e-05,
561
+ "header_content-type": 8.688399249322305e-06,
562
+ "user-agent_device_model": 8.688399249322305e-06,
563
+ "user-agent_device_brand": 8.688399249322305e-06,
564
+ "user-agent_os_version": 8.688399249322305e-06,
565
+ "request.headers.Keep-Alive": 8.688399249322305e-06,
566
+ "trapped_for": 1.3032598873983458e-05,
567
+ "request.headers.X-Requested-With": 8.688399249322305e-06,
568
+ "commands": 4.344199624661153e-06
569
+ }
570
+ }
571
+ }
train.csv ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:138704796a5ef7f9d6e9b3c3415bbdc22b06d1a1a2c55afc41908eda00e3e29c
3
+ size 343354174
train.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c508250448909dd10230c8a4c453ad5b2197f770a6b6334d02fa82dc225f48d8
3
+ size 1057941440
train.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:65788f1f18f80743880316fef6b5c9cc6066f0a9487d306c21672d4cc2620da4
3
+ size 23837549
upload_manifest.json ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "upload_session_id": "upload_1759218637",
3
+ "preparation_timestamp": "2025-09-30T07:50:41.123947+00:00",
4
+ "source_path": "outputs/ml_pipeline/attacks-monthly",
5
+ "dataset_format": "huggingface",
6
+ "files_prepared": [
7
+ "README.md",
8
+ "data_files.json",
9
+ "metadata.json",
10
+ "train.jsonl",
11
+ "train.parquet",
12
+ "train.csv"
13
+ ],
14
+ "total_size_bytes": 1425164832
15
+ }