instruction stringclasses 1
value | input stringlengths 537 4.51k | output stringclasses 2
values |
|---|---|---|
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.390+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:34.431+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:00:43.678+0000",
"rule": {
"level": 3,
"description": "Log file rotated.",
"id": "591",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec"
],
"pci_dss": [
"10.5.2",
"10.5.5"
],
"gpg13": [
"10.1"
],
"gdpr": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:01:48.257+0000",
"rule": {
"level": 3,
"description": "Host Unblocked by firewall-drop Active Response",
"id": "652",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.096+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.346+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 1,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.359+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 2,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.596+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 3,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:46.608+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 4,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.341+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 1,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.342+0000",
"rule": {
"level": 5,
"description": "Web server 400 error code.",
"id": "31101",
"firedtimes": 2,
"mail": false,
"groups": [
"web",
"accesslog",
"attack"
],
"pci_dss": [
"6.5",
"11.4"
],
"gdpr": [
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.362+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 5,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:03:50.480+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 6,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.303+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.302+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.573+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 7,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.586+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 8,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.797+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 9,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:07:18.809+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 10,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.359+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.636+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 11,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.650+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 12,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.847+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 13,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:16.859+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 14,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.368+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.369+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.647+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 15,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.661+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 16,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.854+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 17,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:08:26.866+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 18,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.434+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.714+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 19,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.728+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 20,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.914+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 21,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:09:30.926+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 22,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.472+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.755+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 23,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.768+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 24,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.946+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 25,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:08.959+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 26,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.499+0000",
"rule": {
"level": 5,
"description": "sshd: Attempt to login using a non-existent user",
"id": "5710",
"mitre": {
"id": [
"T1110.001",
"T1021.004"
],
"tactic": [
"Credential Access",
"Lateral Movement"
... | True Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.778+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 27,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.792+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 28,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Classify the following Wazuh alert as a true positive or false positive. | {
"timestamp": "2025-03-05T00:10:34.971+0000",
"rule": {
"level": 3,
"description": "Host Blocked by firewall-drop Active Response",
"id": "651",
"firedtimes": 29,
"mail": false,
"groups": [
"ossec",
"active_response"
],
"pci_dss": [
"11.4"
],
"gpg13": [
... | False Positive |
Wazuh Alerts Dataset
π Overview
This dataset contains a collection of security alerts generated by the Wazuh SIEM/XDR platform. It captures various security events, including system audits, authentication failures, and potential intrusion attempts, making it an ideal resource for researchers and developers working on Security Operations Center (SOC) automation and Machine Learning for Cybersecurity.
ποΈ Dataset Details
- Author: Kholil Haq Alim Hakim
- Data Source: Live Wazuh Manager logs (Alerts.json)
- Format: JSON / Parquet
- Status: Curated Dataset
π― Intended Use
- Anomaly Detection: Training models to identify unusual patterns in security logs.
- Rule Validation: Testing and refining SIEM correlation rules.
- Dashboard Prototyping: Building visualizations for SOC analyst tools.
- Educational Purposes: Learning the structure of Wazuh alerts and OSSEC-based logging.
π Data Structure
The dataset follows the standard Wazuh alert schema. Key fields include:
| Field | Description |
|---|---|
timestamp |
UTC time of the generated alert |
rule.id |
The specific Wazuh rule ID triggered |
rule.level |
Severity level (1-15) |
rule.description |
Human-readable description of the security event |
agent.id |
Unique identifier of the monitored endpoint |
data |
Metadata containing source IP, usernames, or process IDs |
π οΈ How to Use
You can load this dataset directly using the Hugging Face datasets library:
from datasets import load_dataset
dataset = load_dataset("kholil-lil/wazuh-alerts")
print(dataset['train'][0])
π Citation & Attribution
If you use this dataset in a professional project or academic research, please cite it as follows:
APA Format
Hakim, K. H. A. (2025). Wazuh Alerts Dataset [Data set]. Hugging Face. https://huggingface.co/datasets/kholil-lil/wazuh-alerts
BibTeX Format
@misc{hakim_wazuh_2025,
author = {Hakim, Kholil Haq Alim},
title = {Wazuh Alerts Dataset},
year = {2025},
publisher = {Hugging Face},
howpublished = {\url{[https://huggingface.co/datasets/kholil-lil/wazuh-alerts](https://huggingface.co/datasets/kholil-lil/wazuh-alerts)}}
}
βοΈ License
This dataset is licensed under the MIT License. You are free to share, modify, and use the data for any purpose, provided that attribution is given to the author.
π§ Contact
- Maintainer: Kholil Haq Alim Hakim
- Location: Makassar, Indonesia
- Hugging Face: huggingface.co/kholil-lil
- Downloads last month
- 27