Dataset Viewer
Auto-converted to Parquet Duplicate
instruction
stringclasses
1 value
input
stringlengths
537
4.51k
output
stringclasses
2 values
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.390+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 1, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 2, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:34.431+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 3, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 4, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:00:43.678+0000", "rule": { "level": 3, "description": "Log file rotated.", "id": "591", "firedtimes": 5, "mail": false, "groups": [ "ossec" ], "pci_dss": [ "10.5.2", "10.5.5" ], "gpg13": [ "10.1" ], "gdpr": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:01:48.257+0000", "rule": { "level": 3, "description": "Host Unblocked by firewall-drop Active Response", "id": "652", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.096+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.346+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 1, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.359+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 2, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.596+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 3, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:46.608+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 4, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.341+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 1, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.342+0000", "rule": { "level": 5, "description": "Web server 400 error code.", "id": "31101", "firedtimes": 2, "mail": false, "groups": [ "web", "accesslog", "attack" ], "pci_dss": [ "6.5", "11.4" ], "gdpr": [ ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.362+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 5, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:03:50.480+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 6, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.303+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.302+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.573+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 7, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.586+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 8, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.797+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 9, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:07:18.809+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 10, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.359+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.636+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 11, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.650+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 12, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.847+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 13, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:16.859+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 14, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.368+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.369+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.647+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 15, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.661+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 16, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.854+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 17, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:08:26.866+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 18, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.434+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.714+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 19, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.728+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 20, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.914+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 21, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:09:30.926+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 22, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.472+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.755+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 23, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.768+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 24, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.946+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 25, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:08.959+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 26, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.499+0000", "rule": { "level": 5, "description": "sshd: Attempt to login using a non-existent user", "id": "5710", "mitre": { "id": [ "T1110.001", "T1021.004" ], "tactic": [ "Credential Access", "Lateral Movement" ...
True Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.778+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 27, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.792+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 28, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
Classify the following Wazuh alert as a true positive or false positive.
{ "timestamp": "2025-03-05T00:10:34.971+0000", "rule": { "level": 3, "description": "Host Blocked by firewall-drop Active Response", "id": "651", "firedtimes": 29, "mail": false, "groups": [ "ossec", "active_response" ], "pci_dss": [ "11.4" ], "gpg13": [ ...
False Positive
End of preview. Expand in Data Studio

Wazuh Alerts Dataset

πŸ“Œ Overview

This dataset contains a collection of security alerts generated by the Wazuh SIEM/XDR platform. It captures various security events, including system audits, authentication failures, and potential intrusion attempts, making it an ideal resource for researchers and developers working on Security Operations Center (SOC) automation and Machine Learning for Cybersecurity.

πŸ—‚οΈ Dataset Details

  • Author: Kholil Haq Alim Hakim
  • Data Source: Live Wazuh Manager logs (Alerts.json)
  • Format: JSON / Parquet
  • Status: Curated Dataset

🎯 Intended Use

  • Anomaly Detection: Training models to identify unusual patterns in security logs.
  • Rule Validation: Testing and refining SIEM correlation rules.
  • Dashboard Prototyping: Building visualizations for SOC analyst tools.
  • Educational Purposes: Learning the structure of Wazuh alerts and OSSEC-based logging.

πŸ“Š Data Structure

The dataset follows the standard Wazuh alert schema. Key fields include:

Field Description
timestamp UTC time of the generated alert
rule.id The specific Wazuh rule ID triggered
rule.level Severity level (1-15)
rule.description Human-readable description of the security event
agent.id Unique identifier of the monitored endpoint
data Metadata containing source IP, usernames, or process IDs

πŸ› οΈ How to Use

You can load this dataset directly using the Hugging Face datasets library:

from datasets import load_dataset

dataset = load_dataset("kholil-lil/wazuh-alerts")
print(dataset['train'][0])

πŸ“œ Citation & Attribution

If you use this dataset in a professional project or academic research, please cite it as follows:

APA Format

Hakim, K. H. A. (2025). Wazuh Alerts Dataset [Data set]. Hugging Face. https://huggingface.co/datasets/kholil-lil/wazuh-alerts

BibTeX Format

@misc{hakim_wazuh_2025,
  author = {Hakim, Kholil Haq Alim},
  title = {Wazuh Alerts Dataset},
  year = {2025},
  publisher = {Hugging Face},
  howpublished = {\url{[https://huggingface.co/datasets/kholil-lil/wazuh-alerts](https://huggingface.co/datasets/kholil-lil/wazuh-alerts)}}
}

βš–οΈ License

This dataset is licensed under the MIT License. You are free to share, modify, and use the data for any purpose, provided that attribution is given to the author.

πŸ“§ Contact

Downloads last month
27