pyToshka commited on
Commit
a5b183f
·
verified ·
1 Parent(s): e8966e7

Upload dataset - Session upload_1759214611

Browse files
Files changed (8) hide show
  1. .gitattributes +2 -0
  2. README.md +490 -0
  3. data_files.json +7 -0
  4. metadata.json +508 -0
  5. train.csv +3 -0
  6. train.jsonl +3 -0
  7. train.parquet +3 -0
  8. upload_manifest.json +15 -0
.gitattributes CHANGED
@@ -57,3 +57,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
 
57
  # Video files - compressed
58
  *.mp4 filter=lfs diff=lfs merge=lfs -text
59
  *.webm filter=lfs diff=lfs merge=lfs -text
60
+ train.csv filter=lfs diff=lfs merge=lfs -text
61
+ train.jsonl filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,490 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ language:
3
+ - en
4
+ task_categories:
5
+ - tabular-classification
6
+ - other
7
+ task_ids:
8
+ - tabular-multi-class-classification
9
+ - multi-class-classification
10
+ pretty_name: Honeypot Cybersecurity Dataset
11
+ size_categories:
12
+ - 10K<n<100K
13
+ source_datasets:
14
+ - original
15
+ license: bsd-3-clause
16
+ tags:
17
+ - cybersecurity
18
+ - honeypot
19
+ - threat-detection
20
+ - network-security
21
+ - intrusion-detection
22
+ - tabular
23
+ - security
24
+ - anomaly-detection
25
+ - classification
26
+ multilinguality:
27
+ - monolingual
28
+ annotations_creators:
29
+ - machine-generated
30
+ paperswithcode_id: null
31
+ dataset_info:
32
+ features:
33
+ - name: dest_port
34
+ dtype: int64
35
+ - name: geoip
36
+ dtype: string
37
+ - name: host
38
+ dtype: string
39
+ - name: subject
40
+ dtype: string
41
+ - name: "@timestamp"
42
+ dtype: string
43
+ - name: type
44
+ dtype: string
45
+ - name: src_ip
46
+ dtype: string
47
+ - name: honeypot_ip_int
48
+ dtype: string
49
+ - name: "@version"
50
+ dtype: string
51
+ - name: link
52
+ dtype: string
53
+ - name: honeypot_hostname
54
+ dtype: string
55
+ - name: honeypot_ip_ext
56
+ dtype: string
57
+ - name: mod
58
+ dtype: string
59
+ - name: src_port
60
+ dtype: string
61
+ - name: geoip_ext
62
+ dtype: string
63
+ - name: raw_mtu
64
+ dtype: string
65
+ - name: dest_ip
66
+ dtype: string
67
+ - name: mitre_techniques
68
+ dtype: string
69
+ - name: attack_vectors
70
+ dtype: string
71
+ - name: mitre_tactic
72
+ dtype: string
73
+ - name: mitre_technique
74
+ dtype: string
75
+ - name: confidence_score
76
+ dtype: string
77
+ - name: is_malicious
78
+ dtype: bool
79
+ - name: severity
80
+ dtype: string
81
+ - name: primary_label
82
+ dtype: string
83
+ - name: timestamp
84
+ dtype: string
85
+ - name: tx_guessed
86
+ dtype: string
87
+ - name: payload
88
+ dtype: string
89
+ - name: metadata
90
+ dtype: string
91
+ - name: tx_id
92
+ dtype: string
93
+ - name: event_type
94
+ dtype: string
95
+ - name: proto
96
+ dtype: string
97
+ - name: app_proto
98
+ dtype: string
99
+ - name: payload_printable
100
+ dtype: string
101
+ - name: in_iface
102
+ dtype: string
103
+ - name: pkt_src
104
+ dtype: string
105
+ - name: flow
106
+ dtype: string
107
+ - name: direction
108
+ dtype: string
109
+ - name: alert
110
+ dtype: string
111
+ - name: flow_id
112
+ dtype: string
113
+ - name: stream
114
+ dtype: string
115
+ - name: ip_rep
116
+ dtype: string
117
+ - name: tcp
118
+ dtype: string
119
+ - name: rdp
120
+ dtype: string
121
+ - name: tags
122
+ dtype: string
123
+ - name: smb
124
+ dtype: string
125
+ - name: fatt_tls
126
+ dtype: string
127
+ - name: protocol
128
+ dtype: string
129
+ - name: action
130
+ dtype: string
131
+ - name: params
132
+ dtype: string
133
+ - name: raw_sig
134
+ dtype: string
135
+ - name: os
136
+ dtype: string
137
+ - name: dist
138
+ dtype: string
139
+ - name: mstshash
140
+ dtype: string
141
+ - name: data
142
+ dtype: string
143
+ - name: ssh
144
+ dtype: string
145
+ - name: message
146
+ dtype: string
147
+ - name: msg
148
+ dtype: string
149
+ - name: status
150
+ dtype: string
151
+ - name: level
152
+ dtype: string
153
+ - name: session
154
+ dtype: string
155
+ - name: service
156
+ dtype: string
157
+ - name: password
158
+ dtype: string
159
+ - name: client
160
+ dtype: string
161
+ - name: username
162
+ dtype: string
163
+ - name: reason
164
+ dtype: string
165
+ - name: raw_hits
166
+ dtype: string
167
+ - name: fatt_ssh
168
+ dtype: string
169
+ - name: operation_mode
170
+ dtype: string
171
+ - name: attack_connection
172
+ dtype: string
173
+ - name: download_tries
174
+ dtype: string
175
+ - name: proxy_connection
176
+ dtype: string
177
+ - name: start_time
178
+ dtype: string
179
+ - name: downloads
180
+ dtype: string
181
+ - name: download_count
182
+ dtype: string
183
+ - name: is_virtual
184
+ dtype: string
185
+ - name: end_time
186
+ dtype: string
187
+ - name: fatt_rdp
188
+ dtype: string
189
+ - name: client_version
190
+ dtype: string
191
+ - name: input
192
+ dtype: string
193
+ - name: environ
194
+ dtype: string
195
+ - name: raw_freq
196
+ dtype: string
197
+ - name: uptime
198
+ dtype: string
199
+ - name: session_duration
200
+ dtype: float64
201
+ - name: fileinfo
202
+ dtype: string
203
+ - name: http
204
+ dtype: string
205
+ - name: anomaly
206
+ dtype: string
207
+ - name: fatt_http
208
+ dtype: string
209
+ - name: ftp
210
+ dtype: string
211
+ - name: lang
212
+ dtype: string
213
+ - name: app
214
+ dtype: string
215
+ - name: tls
216
+ dtype: string
217
+ - name: output
218
+ dtype: string
219
+ - name: files
220
+ dtype: string
221
+ - name: app_proto_tc
222
+ dtype: string
223
+ - name: smtp
224
+ dtype: string
225
+ - name: icmp_code
226
+ dtype: string
227
+ - name: icmp_type
228
+ dtype: string
229
+ - name: response.body
230
+ dtype: string
231
+ - name: request.headers.Accept
232
+ dtype: string
233
+ - name: request.headers.sorted
234
+ dtype: string
235
+ - name: request.userAgent
236
+ dtype: string
237
+ - name: request.method
238
+ dtype: string
239
+ - name: request.protocol
240
+ dtype: string
241
+ - name: sensorName
242
+ dtype: string
243
+ - name: response.metadata.temperature
244
+ dtype: string
245
+ - name: response.metadata.provider
246
+ dtype: string
247
+ - name: request.body
248
+ dtype: string
249
+ - name: "response.headers.Content-Type"
250
+ dtype: string
251
+ - name: response.metadata.model
252
+ dtype: string
253
+ - name: request.bodySha256
254
+ dtype: string
255
+ - name: request.headers.sortedSha256
256
+ dtype: string
257
+ - name: response.headers.Server
258
+ dtype: string
259
+ - name: request.requestURI
260
+ dtype: string
261
+ - name: response.metadata.generationSource
262
+ dtype: string
263
+ - name: hostname
264
+ dtype: string
265
+ - name: "request.headers.User-Agent"
266
+ dtype: string
267
+ - name: request.headers.Connection
268
+ dtype: string
269
+ - name: "request.headers.Content-Type"
270
+ dtype: string
271
+ - name: request.headers.Origin
272
+ dtype: string
273
+ - name: "request.headers.Accept-Language"
274
+ dtype: string
275
+ - name: "request.headers.Accept-Encoding"
276
+ dtype: string
277
+ - name: "request.headers.Upgrade-Insecure-Requests"
278
+ dtype: string
279
+ - name: app_proto_ts
280
+ dtype: string
281
+ - name: fileinfo.state
282
+ dtype: string
283
+ - name: http.http_method
284
+ dtype: string
285
+ - name: fileinfo.filename
286
+ dtype: string
287
+ - name: data_type
288
+ dtype: string
289
+ - name: id
290
+ dtype: string
291
+ - name: response
292
+ dtype: string
293
+ - name: public_ip
294
+ dtype: string
295
+ - name: request
296
+ dtype: string
297
+ - name: sensorid
298
+ dtype: string
299
+ - name: shasum
300
+ dtype: string
301
+ - name: filename
302
+ dtype: string
303
+ - name: outfile
304
+ dtype: string
305
+ - name: eventid
306
+ dtype: string
307
+ - name: src_url
308
+ dtype: string
309
+ - name: sensor
310
+ dtype: string
311
+ - name: duration
312
+ dtype: string
313
+ - name: request_uri
314
+ dtype: string
315
+ - name: request_method
316
+ dtype: string
317
+ - name: "user-agent"
318
+ dtype: string
319
+ - name: "header_accept-encoding"
320
+ dtype: string
321
+ - name: trapped
322
+ dtype: string
323
+ - name: "user-agent_os"
324
+ dtype: string
325
+ - name: "header_user-agent"
326
+ dtype: string
327
+ - name: header_accept
328
+ dtype: string
329
+ - name: "user-agent_browser"
330
+ dtype: string
331
+ - name: header_connection
332
+ dtype: string
333
+ - name: "request.headers.X-Requested-With"
334
+ dtype: string
335
+ - name: "user-agent_device_brand"
336
+ dtype: string
337
+ - name: "user-agent_os_version"
338
+ dtype: string
339
+ - name: "user-agent_device_model"
340
+ dtype: string
341
+ - name: "user-agent_browser_version"
342
+ dtype: string
343
+ - name: "request.headers.Accept-Charset"
344
+ dtype: string
345
+ - name: "header_content-type"
346
+ dtype: string
347
+ - name: trapped_for
348
+ dtype: string
349
+ - name: commands
350
+ dtype: string
351
+ splits:
352
+ - name: train
353
+ num_bytes: 780139661
354
+ num_examples: 76396
355
+ download_size: 780139661
356
+ dataset_size: 780139661
357
+ config_name: default
358
+ ---
359
+
360
+ # attacks-weekly
361
+
362
+ ## Dataset Description
363
+
364
+ This dataset contains cybersecurity events collected from honeypot infrastructure.
365
+
366
+ The data has been processed and feature-engineered for machine learning applications in threat detection and security analytics.
367
+
368
+ ## Feature Categories
369
+
370
+ ### Network Features
371
+ - Connection flow statistics (bytes, packets, duration)
372
+ - Protocol-specific metrics
373
+ - Geographic information
374
+ - IP reputation data
375
+
376
+ ### Behavioral Features
377
+ - Session patterns and command sequences
378
+ - User-agent analysis
379
+ - Attack pattern identification
380
+ - Protocol fingerprinting
381
+
382
+ ### Temporal Features
383
+ - Time-based aggregations
384
+ - Frequency analysis
385
+ - Campaign detection indicators
386
+ - Attack timing patterns
387
+
388
+ ### Security Labels
389
+ - MITRE ATT&CK technique mappings
390
+ - Alert severity classifications
391
+ - Automatic threat categorization
392
+ - Binary maliciousness indicators
393
+
394
+ ## Usage Example
395
+
396
+ ```python
397
+ from datasets import load_dataset
398
+
399
+ # Load the dataset
400
+ dataset = load_dataset("pyToshka/attacks-weekly")
401
+ train_data = dataset["train"]
402
+
403
+ # Basic exploration
404
+ print("Dataset features:", list(train_data.features.keys()))
405
+ print("Total samples:", len(train_data))
406
+
407
+ from collections import Counter
408
+
409
+ # Example: Filter RDP attacks
410
+ rdp_events = train_data.filter(lambda x: x['app_proto'] == 'rdp')
411
+ print("RDP events:", len(rdp_events))
412
+
413
+ # Example: Analyze attack vectors
414
+ if len(rdp_events) > 0:
415
+ attack_vectors = Counter([event['attack_vectors'] for event in rdp_events if event['attack_vectors']])
416
+ print("RDP Attack vectors:")
417
+ for vector, count in attack_vectors.most_common():
418
+ print(f" {vector}: {count}")
419
+
420
+ # Example: Analyze protocol distribution
421
+ protocols = Counter([event['app_proto'] for event in train_data if event['app_proto']])
422
+ print("Protocol distribution:")
423
+ for proto, count in protocols.most_common():
424
+ print(f" {proto if proto else '(empty)'}: {count}")
425
+
426
+ # Example: Malicious events analysis
427
+ malicious_count = sum(1 for event in train_data if event['is_malicious'])
428
+ print(f"Malicious events: {malicious_count}/{len(train_data)} ({malicious_count/len(train_data)*100:.1f}%)")
429
+ ```
430
+
431
+ ## Data Fields
432
+
433
+ The dataset contains 159 features across several categories:
434
+
435
+ ### Network Features
436
+ - `dest_port`: Network-related information
437
+ - `geoip`: Network-related information
438
+ - `src_ip`: Network-related information
439
+ - `honeypot_ip_int`: Network-related information
440
+ - `honeypot_ip_ext`: Network-related information
441
+ - ... and 9 more network features
442
+
443
+ ### Behavioral Features
444
+ - `session`: Behavioral analysis data
445
+ - `username`: Behavioral analysis data
446
+ - `session_duration`: Behavioral analysis data
447
+ - `request.userAgent`: Behavioral analysis data
448
+ - `request.headers.User-Agent`: Behavioral analysis data
449
+ - ... and 9 more behavioral features
450
+
451
+ ### Temporal Features
452
+ - `@timestamp`: Time-based information
453
+ - `timestamp`: Time-based information
454
+ - `start_time`: Time-based information
455
+ - `end_time`: Time-based information
456
+ - `uptime`: Time-based information
457
+ - ... and 2 more temporal features
458
+
459
+ ### Security Features
460
+ - `mitre_techniques`: Security and threat intelligence
461
+ - `attack_vectors`: Security and threat intelligence
462
+ - `mitre_tactic`: Security and threat intelligence
463
+ - `mitre_technique`: Security and threat intelligence
464
+ - `is_malicious`: Security and threat intelligence
465
+ - ... and 2 more security features
466
+
467
+ ## Data Splits
468
+
469
+ | Split | Examples |
470
+ |-------|----------|
471
+ | train | 76,396 |
472
+
473
+ ## Dataset Statistics
474
+
475
+ - **Total size**: ~744.0 MB
476
+ - **Average record size**: ~10212 bytes
477
+ - **Feature completeness**: 100.0%
478
+
479
+ ## Ethical Considerations
480
+
481
+ This dataset contains real honeypot data representing actual attack attempts. Users should:
482
+
483
+ - **Privacy**: Respect anonymization measures implemented in the dataset
484
+ - **Research Use**: Use data only for legitimate cybersecurity research and education
485
+ - **Responsible Disclosure**: Follow responsible disclosure practices for any findings
486
+ - **Legal Compliance**: Comply with applicable laws and regulations in your jurisdiction
487
+ - **No Reidentification**: Do not attempt to identify or contact attackers
488
+ - **Defensive Purpose**: Use insights for defensive security improvements only
489
+
490
+
data_files.json ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ {
2
+ "train": {
3
+ "csv": "train.csv",
4
+ "parquet": "train.parquet",
5
+ "jsonl": "train.jsonl"
6
+ }
7
+ }
metadata.json ADDED
@@ -0,0 +1,508 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "dataset_info": {
3
+ "name": "attacks-weekly",
4
+ "version": "1.0.0",
5
+ "description": "Cybersecurity dataset from honeypot infrastructure",
6
+ "total_samples": 76396,
7
+ "features": 159,
8
+ "creation_timestamp": "2025-09-30T06:43:08.376575+00:00",
9
+ "data_source": "Honeypot Infrastructure",
10
+ "honeypot_types": {},
11
+ "time_range": {
12
+ "start": "",
13
+ "end": "2025-09-29T23:59:57.152601+00:00"
14
+ }
15
+ },
16
+ "statistics": {
17
+ "total_events": 100000,
18
+ "successful_extractions": 100000,
19
+ "feature_extraction_time": 92.815374,
20
+ "dataset_creation_time": 0,
21
+ "quality_score": 0.0
22
+ },
23
+ "feature_schema": {
24
+ "dest_port": "int64",
25
+ "geoip": "object",
26
+ "host": "object",
27
+ "subject": "object",
28
+ "@timestamp": "object",
29
+ "type": "object",
30
+ "src_ip": "object",
31
+ "honeypot_ip_int": "object",
32
+ "@version": "object",
33
+ "link": "object",
34
+ "honeypot_hostname": "object",
35
+ "honeypot_ip_ext": "object",
36
+ "mod": "object",
37
+ "src_port": "object",
38
+ "geoip_ext": "object",
39
+ "raw_mtu": "object",
40
+ "dest_ip": "object",
41
+ "mitre_techniques": "object",
42
+ "attack_vectors": "object",
43
+ "mitre_tactic": "object",
44
+ "mitre_technique": "object",
45
+ "confidence_score": "object",
46
+ "is_malicious": "bool",
47
+ "severity": "object",
48
+ "primary_label": "object",
49
+ "timestamp": "object",
50
+ "tx_guessed": "object",
51
+ "payload": "object",
52
+ "metadata": "object",
53
+ "tx_id": "object",
54
+ "event_type": "object",
55
+ "proto": "object",
56
+ "app_proto": "object",
57
+ "payload_printable": "object",
58
+ "in_iface": "object",
59
+ "pkt_src": "object",
60
+ "flow": "object",
61
+ "direction": "object",
62
+ "alert": "object",
63
+ "flow_id": "object",
64
+ "stream": "object",
65
+ "ip_rep": "object",
66
+ "tcp": "object",
67
+ "rdp": "object",
68
+ "tags": "object",
69
+ "smb": "object",
70
+ "fatt_tls": "object",
71
+ "protocol": "object",
72
+ "action": "object",
73
+ "params": "object",
74
+ "raw_sig": "object",
75
+ "os": "object",
76
+ "dist": "object",
77
+ "mstshash": "object",
78
+ "data": "object",
79
+ "ssh": "object",
80
+ "message": "object",
81
+ "msg": "object",
82
+ "status": "object",
83
+ "level": "object",
84
+ "session": "object",
85
+ "service": "object",
86
+ "password": "object",
87
+ "client": "object",
88
+ "username": "object",
89
+ "reason": "object",
90
+ "raw_hits": "object",
91
+ "fatt_ssh": "object",
92
+ "operation_mode": "object",
93
+ "attack_connection": "object",
94
+ "download_tries": "object",
95
+ "proxy_connection": "object",
96
+ "start_time": "object",
97
+ "downloads": "object",
98
+ "download_count": "object",
99
+ "is_virtual": "object",
100
+ "end_time": "object",
101
+ "fatt_rdp": "object",
102
+ "client_version": "object",
103
+ "input": "object",
104
+ "environ": "object",
105
+ "raw_freq": "object",
106
+ "uptime": "object",
107
+ "session_duration": "float64",
108
+ "fileinfo": "object",
109
+ "http": "object",
110
+ "anomaly": "object",
111
+ "fatt_http": "object",
112
+ "ftp": "object",
113
+ "lang": "object",
114
+ "app": "object",
115
+ "tls": "object",
116
+ "output": "object",
117
+ "files": "object",
118
+ "app_proto_tc": "object",
119
+ "smtp": "object",
120
+ "icmp_code": "object",
121
+ "icmp_type": "object",
122
+ "response.body": "object",
123
+ "request.headers.Accept": "object",
124
+ "request.headers.sorted": "object",
125
+ "request.userAgent": "object",
126
+ "request.method": "object",
127
+ "request.protocol": "object",
128
+ "sensorName": "object",
129
+ "response.metadata.temperature": "object",
130
+ "response.metadata.provider": "object",
131
+ "request.body": "object",
132
+ "response.headers.Content-Type": "object",
133
+ "response.metadata.model": "object",
134
+ "request.bodySha256": "object",
135
+ "request.headers.sortedSha256": "object",
136
+ "response.headers.Server": "object",
137
+ "request.requestURI": "object",
138
+ "response.metadata.generationSource": "object",
139
+ "hostname": "object",
140
+ "request.headers.User-Agent": "object",
141
+ "request.headers.Connection": "object",
142
+ "request.headers.Content-Type": "object",
143
+ "request.headers.Origin": "object",
144
+ "request.headers.Accept-Language": "object",
145
+ "request.headers.Accept-Encoding": "object",
146
+ "request.headers.Upgrade-Insecure-Requests": "object",
147
+ "app_proto_ts": "object",
148
+ "fileinfo.state": "object",
149
+ "http.http_method": "object",
150
+ "fileinfo.filename": "object",
151
+ "data_type": "object",
152
+ "id": "object",
153
+ "response": "object",
154
+ "public_ip": "object",
155
+ "request": "object",
156
+ "sensorid": "object",
157
+ "shasum": "object",
158
+ "filename": "object",
159
+ "outfile": "object",
160
+ "eventid": "object",
161
+ "src_url": "object",
162
+ "sensor": "object",
163
+ "duration": "object",
164
+ "request_uri": "object",
165
+ "request_method": "object",
166
+ "user-agent": "object",
167
+ "header_accept-encoding": "object",
168
+ "trapped": "object",
169
+ "user-agent_os": "object",
170
+ "header_user-agent": "object",
171
+ "header_accept": "object",
172
+ "user-agent_browser": "object",
173
+ "header_connection": "object",
174
+ "request.headers.X-Requested-With": "object",
175
+ "user-agent_device_brand": "object",
176
+ "user-agent_os_version": "object",
177
+ "user-agent_device_model": "object",
178
+ "user-agent_browser_version": "object",
179
+ "request.headers.Accept-Charset": "object",
180
+ "header_content-type": "object",
181
+ "trapped_for": "object",
182
+ "commands": "object"
183
+ },
184
+ "quality_metrics": {
185
+ "completeness": {
186
+ "dest_port": 1.0,
187
+ "geoip": 1.0,
188
+ "host": 1.0,
189
+ "subject": 1.0,
190
+ "@timestamp": 1.0,
191
+ "type": 1.0,
192
+ "src_ip": 1.0,
193
+ "honeypot_ip_int": 1.0,
194
+ "@version": 1.0,
195
+ "link": 1.0,
196
+ "honeypot_hostname": 1.0,
197
+ "honeypot_ip_ext": 1.0,
198
+ "mod": 1.0,
199
+ "src_port": 1.0,
200
+ "geoip_ext": 1.0,
201
+ "raw_mtu": 1.0,
202
+ "dest_ip": 1.0,
203
+ "mitre_techniques": 1.0,
204
+ "attack_vectors": 1.0,
205
+ "mitre_tactic": 1.0,
206
+ "mitre_technique": 1.0,
207
+ "confidence_score": 1.0,
208
+ "is_malicious": 1.0,
209
+ "severity": 1.0,
210
+ "primary_label": 1.0,
211
+ "timestamp": 1.0,
212
+ "tx_guessed": 1.0,
213
+ "payload": 1.0,
214
+ "metadata": 1.0,
215
+ "tx_id": 1.0,
216
+ "event_type": 1.0,
217
+ "proto": 1.0,
218
+ "app_proto": 1.0,
219
+ "payload_printable": 1.0,
220
+ "in_iface": 1.0,
221
+ "pkt_src": 1.0,
222
+ "flow": 1.0,
223
+ "direction": 1.0,
224
+ "alert": 1.0,
225
+ "flow_id": 1.0,
226
+ "stream": 1.0,
227
+ "ip_rep": 1.0,
228
+ "tcp": 1.0,
229
+ "rdp": 1.0,
230
+ "tags": 1.0,
231
+ "smb": 1.0,
232
+ "fatt_tls": 1.0,
233
+ "protocol": 1.0,
234
+ "action": 1.0,
235
+ "params": 1.0,
236
+ "raw_sig": 1.0,
237
+ "os": 1.0,
238
+ "dist": 1.0,
239
+ "mstshash": 1.0,
240
+ "data": 1.0,
241
+ "ssh": 1.0,
242
+ "message": 1.0,
243
+ "msg": 1.0,
244
+ "status": 1.0,
245
+ "level": 1.0,
246
+ "session": 1.0,
247
+ "service": 1.0,
248
+ "password": 1.0,
249
+ "client": 1.0,
250
+ "username": 1.0,
251
+ "reason": 1.0,
252
+ "raw_hits": 1.0,
253
+ "fatt_ssh": 1.0,
254
+ "operation_mode": 1.0,
255
+ "attack_connection": 1.0,
256
+ "download_tries": 1.0,
257
+ "proxy_connection": 1.0,
258
+ "start_time": 1.0,
259
+ "downloads": 1.0,
260
+ "download_count": 1.0,
261
+ "is_virtual": 1.0,
262
+ "end_time": 1.0,
263
+ "fatt_rdp": 1.0,
264
+ "client_version": 1.0,
265
+ "input": 1.0,
266
+ "environ": 1.0,
267
+ "raw_freq": 1.0,
268
+ "uptime": 1.0,
269
+ "session_duration": 1.0,
270
+ "fileinfo": 1.0,
271
+ "http": 1.0,
272
+ "anomaly": 1.0,
273
+ "fatt_http": 1.0,
274
+ "ftp": 1.0,
275
+ "lang": 1.0,
276
+ "app": 1.0,
277
+ "tls": 1.0,
278
+ "output": 1.0,
279
+ "files": 1.0,
280
+ "app_proto_tc": 1.0,
281
+ "smtp": 1.0,
282
+ "icmp_code": 1.0,
283
+ "icmp_type": 1.0,
284
+ "response.body": 1.0,
285
+ "request.headers.Accept": 1.0,
286
+ "request.headers.sorted": 1.0,
287
+ "request.userAgent": 1.0,
288
+ "request.method": 1.0,
289
+ "request.protocol": 1.0,
290
+ "sensorName": 1.0,
291
+ "response.metadata.temperature": 1.0,
292
+ "response.metadata.provider": 1.0,
293
+ "request.body": 1.0,
294
+ "response.headers.Content-Type": 1.0,
295
+ "response.metadata.model": 1.0,
296
+ "request.bodySha256": 1.0,
297
+ "request.headers.sortedSha256": 1.0,
298
+ "response.headers.Server": 1.0,
299
+ "request.requestURI": 1.0,
300
+ "response.metadata.generationSource": 1.0,
301
+ "hostname": 1.0,
302
+ "request.headers.User-Agent": 1.0,
303
+ "request.headers.Connection": 1.0,
304
+ "request.headers.Content-Type": 1.0,
305
+ "request.headers.Origin": 1.0,
306
+ "request.headers.Accept-Language": 1.0,
307
+ "request.headers.Accept-Encoding": 1.0,
308
+ "request.headers.Upgrade-Insecure-Requests": 1.0,
309
+ "app_proto_ts": 1.0,
310
+ "fileinfo.state": 1.0,
311
+ "http.http_method": 1.0,
312
+ "fileinfo.filename": 1.0,
313
+ "data_type": 1.0,
314
+ "id": 1.0,
315
+ "response": 1.0,
316
+ "public_ip": 1.0,
317
+ "request": 1.0,
318
+ "sensorid": 1.0,
319
+ "shasum": 1.0,
320
+ "filename": 1.0,
321
+ "outfile": 1.0,
322
+ "eventid": 1.0,
323
+ "src_url": 1.0,
324
+ "sensor": 1.0,
325
+ "duration": 1.0,
326
+ "request_uri": 1.0,
327
+ "request_method": 1.0,
328
+ "user-agent": 1.0,
329
+ "header_accept-encoding": 1.0,
330
+ "trapped": 1.0,
331
+ "user-agent_os": 1.0,
332
+ "header_user-agent": 1.0,
333
+ "header_accept": 1.0,
334
+ "user-agent_browser": 1.0,
335
+ "header_connection": 1.0,
336
+ "request.headers.X-Requested-With": 1.0,
337
+ "user-agent_device_brand": 1.0,
338
+ "user-agent_os_version": 1.0,
339
+ "user-agent_device_model": 1.0,
340
+ "user-agent_browser_version": 1.0,
341
+ "request.headers.Accept-Charset": 1.0,
342
+ "header_content-type": 1.0,
343
+ "trapped_for": 1.0,
344
+ "commands": 1.0
345
+ },
346
+ "uniqueness": {
347
+ "dest_port": 0.019294203885020157,
348
+ "geoip": 0.016885700822032567,
349
+ "host": 0.003913817477354835,
350
+ "subject": 3.92690716791455e-05,
351
+ "@timestamp": 0.3793523221111053,
352
+ "type": 0.000157076286716582,
353
+ "src_ip": 0.011204775119116184,
354
+ "honeypot_ip_int": 0.5861301638829258,
355
+ "@version": 1.3089690559715169e-05,
356
+ "link": 0.00011780721503743651,
357
+ "honeypot_hostname": 0.003913817477354835,
358
+ "honeypot_ip_ext": 1.3089690559715169e-05,
359
+ "mod": 0.00011780721503743651,
360
+ "src_port": 0.08999162259804178,
361
+ "geoip_ext": 9.162783391800618e-05,
362
+ "raw_mtu": 0.00026179381119430337,
363
+ "dest_ip": 7.8538143358291e-05,
364
+ "mitre_techniques": 1.3089690559715169e-05,
365
+ "attack_vectors": 1.3089690559715169e-05,
366
+ "mitre_tactic": 1.3089690559715169e-05,
367
+ "mitre_technique": 1.3089690559715169e-05,
368
+ "confidence_score": 1.3089690559715169e-05,
369
+ "is_malicious": 1.3089690559715169e-05,
370
+ "severity": 1.3089690559715169e-05,
371
+ "primary_label": 3.92690716791455e-05,
372
+ "timestamp": 0.4636891983873501,
373
+ "tx_guessed": 2.6179381119430338e-05,
374
+ "payload": 0.012723179224043143,
375
+ "metadata": 0.000628305146866328,
376
+ "tx_id": 6.544845279857584e-05,
377
+ "event_type": 0.00018325566783601235,
378
+ "proto": 3.92690716791455e-05,
379
+ "app_proto": 0.00013089690559715169,
380
+ "payload_printable": 0.012710089533483428,
381
+ "in_iface": 2.6179381119430338e-05,
382
+ "pkt_src": 5.2358762238860676e-05,
383
+ "flow": 0.22802240955023823,
384
+ "direction": 3.92690716791455e-05,
385
+ "alert": 0.0067411906382533115,
386
+ "flow_id": 0.10145819152835227,
387
+ "stream": 3.92690716791455e-05,
388
+ "ip_rep": 5.2358762238860676e-05,
389
+ "tcp": 0.0027488350175401853,
390
+ "rdp": 0.0001701659772762972,
391
+ "tags": 1.3089690559715169e-05,
392
+ "smb": 0.0007330226713440494,
393
+ "fatt_tls": 0.0005497670035080371,
394
+ "protocol": 0.00018325566783601235,
395
+ "action": 6.544845279857584e-05,
396
+ "params": 0.00010471752447772135,
397
+ "raw_sig": 0.005615477250117807,
398
+ "os": 0.000157076286716582,
399
+ "dist": 0.00039269071679145503,
400
+ "mstshash": 2.6179381119430338e-05,
401
+ "data": 0.00027488350175401856,
402
+ "ssh": 0.00048431855070946124,
403
+ "message": 0.005288234986124928,
404
+ "msg": 9.162783391800618e-05,
405
+ "status": 2.6179381119430338e-05,
406
+ "level": 3.92690716791455e-05,
407
+ "session": 0.005406042201162364,
408
+ "service": 2.6179381119430338e-05,
409
+ "password": 0.0012827896748520864,
410
+ "client": 9.162783391800618e-05,
411
+ "username": 0.0010340855542174982,
412
+ "reason": 0.0003010628828734489,
413
+ "raw_hits": 0.0007592020524634798,
414
+ "fatt_ssh": 0.0002879731923137337,
415
+ "operation_mode": 2.6179381119430338e-05,
416
+ "attack_connection": 0.004018535001832557,
417
+ "download_tries": 2.6179381119430338e-05,
418
+ "proxy_connection": 0.00010471752447772135,
419
+ "start_time": 0.009751819466987801,
420
+ "downloads": 2.6179381119430338e-05,
421
+ "download_count": 2.6179381119430338e-05,
422
+ "is_virtual": 2.6179381119430338e-05,
423
+ "end_time": 0.009791088538666946,
424
+ "fatt_rdp": 5.2358762238860676e-05,
425
+ "client_version": 2.6179381119430338e-05,
426
+ "input": 0.0003010628828734489,
427
+ "environ": 1.3089690559715169e-05,
428
+ "raw_freq": 0.004044714382951987,
429
+ "uptime": 0.008455940101575998,
430
+ "session_duration": 1.3089690559715169e-05,
431
+ "fileinfo": 0.00010471752447772135,
432
+ "http": 0.0021597989423530026,
433
+ "anomaly": 0.00018325566783601235,
434
+ "fatt_http": 0.00027488350175401856,
435
+ "ftp": 0.00010471752447772135,
436
+ "lang": 5.2358762238860676e-05,
437
+ "app": 7.8538143358291e-05,
438
+ "tls": 0.000706843290224619,
439
+ "output": 0.0007853814335829101,
440
+ "files": 1.3089690559715169e-05,
441
+ "app_proto_tc": 6.544845279857584e-05,
442
+ "smtp": 3.92690716791455e-05,
443
+ "icmp_code": 3.92690716791455e-05,
444
+ "icmp_type": 2.6179381119430338e-05,
445
+ "response.body": 3.92690716791455e-05,
446
+ "request.headers.Accept": 5.2358762238860676e-05,
447
+ "request.headers.sorted": 0.00013089690559715169,
448
+ "request.userAgent": 0.00011780721503743651,
449
+ "request.method": 2.6179381119430338e-05,
450
+ "request.protocol": 3.92690716791455e-05,
451
+ "sensorName": 7.8538143358291e-05,
452
+ "response.metadata.temperature": 2.6179381119430338e-05,
453
+ "response.metadata.provider": 2.6179381119430338e-05,
454
+ "request.body": 1.3089690559715169e-05,
455
+ "response.headers.Content-Type": 3.92690716791455e-05,
456
+ "response.metadata.model": 2.6179381119430338e-05,
457
+ "request.bodySha256": 2.6179381119430338e-05,
458
+ "request.headers.sortedSha256": 0.00014398659615686685,
459
+ "response.headers.Server": 3.92690716791455e-05,
460
+ "request.requestURI": 3.92690716791455e-05,
461
+ "response.metadata.generationSource": 3.92690716791455e-05,
462
+ "hostname": 0.00010471752447772135,
463
+ "request.headers.User-Agent": 0.00011780721503743651,
464
+ "request.headers.Connection": 5.2358762238860676e-05,
465
+ "request.headers.Content-Type": 3.92690716791455e-05,
466
+ "request.headers.Origin": 3.92690716791455e-05,
467
+ "request.headers.Accept-Language": 6.544845279857584e-05,
468
+ "request.headers.Accept-Encoding": 6.544845279857584e-05,
469
+ "request.headers.Upgrade-Insecure-Requests": 2.6179381119430338e-05,
470
+ "app_proto_ts": 2.6179381119430338e-05,
471
+ "fileinfo.state": 2.6179381119430338e-05,
472
+ "http.http_method": 2.6179381119430338e-05,
473
+ "fileinfo.filename": 3.92690716791455e-05,
474
+ "data_type": 3.92690716791455e-05,
475
+ "id": 5.2358762238860676e-05,
476
+ "response": 1.3089690559715169e-05,
477
+ "public_ip": 2.6179381119430338e-05,
478
+ "request": 1.3089690559715169e-05,
479
+ "sensorid": 2.6179381119430338e-05,
480
+ "shasum": 5.2358762238860676e-05,
481
+ "filename": 5.2358762238860676e-05,
482
+ "outfile": 5.2358762238860676e-05,
483
+ "eventid": 6.544845279857584e-05,
484
+ "src_url": 5.2358762238860676e-05,
485
+ "sensor": 2.6179381119430338e-05,
486
+ "duration": 3.92690716791455e-05,
487
+ "request_uri": 0.0002879731923137337,
488
+ "request_method": 2.6179381119430338e-05,
489
+ "user-agent": 6.544845279857584e-05,
490
+ "header_accept-encoding": 2.6179381119430338e-05,
491
+ "trapped": 3.92690716791455e-05,
492
+ "user-agent_os": 3.92690716791455e-05,
493
+ "header_user-agent": 6.544845279857584e-05,
494
+ "header_accept": 3.92690716791455e-05,
495
+ "user-agent_browser": 5.2358762238860676e-05,
496
+ "header_connection": 2.6179381119430338e-05,
497
+ "request.headers.X-Requested-With": 2.6179381119430338e-05,
498
+ "user-agent_device_brand": 2.6179381119430338e-05,
499
+ "user-agent_os_version": 2.6179381119430338e-05,
500
+ "user-agent_device_model": 2.6179381119430338e-05,
501
+ "user-agent_browser_version": 3.92690716791455e-05,
502
+ "request.headers.Accept-Charset": 2.6179381119430338e-05,
503
+ "header_content-type": 2.6179381119430338e-05,
504
+ "trapped_for": 3.92690716791455e-05,
505
+ "commands": 1.3089690559715169e-05
506
+ }
507
+ }
508
+ }
train.csv ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:942daaa53016c3f9ee32b06c4865a17acd7cffebc60a58c3df576666af2d6465
3
+ size 116274039
train.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:464c4ac4c4fa1c9878d855d060fe22d97586e4e5d2f2fb303d79d79b9c610203
3
+ size 316921599
train.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f7c5fd9784a3eed1d4305034d9e6920b7ee5b229118a2454218d3ccb8ce0975c
3
+ size 5432350
upload_manifest.json ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "upload_session_id": "upload_1759214611",
3
+ "preparation_timestamp": "2025-09-30T06:43:32.979398+00:00",
4
+ "source_path": "outputs/ml_pipeline/attacks-weekly",
5
+ "dataset_format": "huggingface",
6
+ "files_prepared": [
7
+ "README.md",
8
+ "data_files.json",
9
+ "metadata.json",
10
+ "train.jsonl",
11
+ "train.parquet",
12
+ "train.csv"
13
+ ],
14
+ "total_size_bytes": 438656153
15
+ }