chYassine's picture
update readme
69caf7e verified
metadata
dataset_info:
  features:
    - name: _raw
      dtype: string
    - name: Type
      dtype: string
    - name: CVSS
      dtype: string
    - name: Score
      dtype: float64
  splits:
    - name: data
      num_bytes: 8940142
      num_examples: 18842
  download_size: 2012662
  dataset_size: 8940142
configs:
  - config_name: default
    data_files:
      - split: data
        path: data/data-*
license: apache-2.0

Web Access Logs Dataset

Overview

This dataset contains web access logs, including information about various types of cyber attacks. It includes details on the type of attack (if any), the CVSS (Common Vulnerability Scoring System) metrics representing the risk of the attack, and a score indicating the percentage of risk.

Dataset Details

  • Number of rows: 18,842
  • Number of distinct types of attacks: 7
  • Total number of tokens: 420,098

Columns

  • Type: The name of the cyber attack. If the log is not an attack, this field is null.
  • CVSS: The CVSS metrics representing the risk of the attack.
  • Score: The percentage of risk.

Attack Types

The dataset includes the following types of attacks:

  • Local File Inclusion (LFI)
  • Server-Side Template Injection (SSTI)
  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Server-Side Request Forgery (SSRF)
  • File Upload
  • Cross-Site Request Forgery (CSRF)

Data Distribution

  • Number of rows for each type:

    • LFI: 3,088
    • SSTI: 2,105
    • SQL Injection: 1,706
    • XSS: 648
    • SSRF: 576
    • File Upload: 437
    • CSRF: 282
  • Average CVSS scores for each type:

    • CSRF: 7.330496
    • LFI: 5.470887
    • SSRF: 3.102091
    • SSTI: 4.605653
    • SQL Injection: 2.921043
    • XSS: 1.221296
    • File Upload: 5.024256
  • Median CVSS scores for each type:

    • CSRF: 8.5
    • LFI: 5.5
    • SSRF: 2.7
    • SSTI: 5.5
    • SQL Injection: 2.7
    • XSS: 1.0
    • File Upload: 5.5

Usage

This dataset is useful for analyzing web security threats and understanding the distribution and severity of different types of cyber attacks. It can be used for machine learning tasks such as anomaly detection, risk assessment, and security analysis.

License

This dataset is provided under the [Apache license 2.0].

Contact

For any questions or issues, please contact [[email protected]].