session_id string | logs list | metadata string | label int64 | attack_ratio float64 | severity_labels string | data_type string | is_attack bool | source string |
|---|---|---|---|---|---|---|---|---|
attacker_0_20220113_1320 | [
"{\"timestamp\":\"1642080091884\",\"no_\":\"58\",\"time\":\"46.157948\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"309\",\"info\":\"Standard query 0x06d4 A 3x6-.2-.DASkBwIEhPg\\/zTW0dTD*Y*9EfI9MHx1AyLdwlFudk0SpbhYbyN5fQiwKbMdk-.efWXRababxXzj2zigm*IXkCiU5E5pvsTSc... | {"duration_seconds": 179.312, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 6} | 0 | 0 | ["", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1325 | [
"{\"timestamp\":\"1642080317271\",\"no_\":\"115\",\"time\":\"271.545365\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x30ec A 3x6-.17-.pfNhh2XdGPzc9zT08GJH9DXvsS7H9KbplvVbuRlZPJdEggzpL7xJmrsPKecJ-.ubC6MW9in72oHE7hxwZArdpXA2UeCe\\/... | {"duration_seconds": 269.487, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8} | 0 | 0 | ["", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1330 | [
"{\"timestamp\":\"1642080632843\",\"no_\":\"192\",\"time\":\"587.117218\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0xcc19 A 3x6-.37-.K1i2ObYdTNCSqcvtveOElTqXQsSwAvI0r5o3vh2bZPP4AoxoyIDh91Rsh3lt-.m8aGbEFwaAFY3h3ma4vuablMjvnQXD0Wv... | {"duration_seconds": 236.414, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 7} | 0 | 0 | ["", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1335 | [
"{\"timestamp\":\"1642080901312\",\"no_\":\"249\",\"time\":\"855.586517\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x66b7 A 3x6-.54-.soPkf5wuqgwA9vm1\\/S06ed30*kbUrrh19M6tDdKcs6bG9GunU*i2fn2SIyCN-.IYAXrAU5YJ16k5EPETqMXZ... | {"duration_seconds": 282.504, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8} | 0 | 0 | ["", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1340 | [
"{\"timestamp\":\"1642081210872\",\"no_\":\"326\",\"time\":\"1165.146208\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x223d A 3x6-.74-.I5tnuVrVTnFZHC2\\/b5kc*LRjQ5E\\/Fz5dp*VOoj4*s3C2ua*YXAQeJjpuYi*5-.lJMUxkwWP5IHrt92cZa... | {"duration_seconds": 278.502, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8} | 0 | 0 | ["", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1345 | [
"{\"timestamp\":\"1642081521431\",\"no_\":\"399\",\"time\":\"1475.704894\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x1e47 A 3x6-.94-.kckxQ3G1yW28JRaxBB81Gju7BCrQbAinmdylk7VAq9hRDwFvn*2wAMSTt\\/Iv-.MRplX6TlZXK9Czo5r5t7s... | {"duration_seconds": 262.493, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8} | 0 | 0 | ["", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1350 | [
"{\"timestamp\":\"1642081814980\",\"no_\":\"469\",\"time\":\"1769.254486\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x6c73 A 3x6-.14-.HsD5SjYHZa3e1uo*g\\/gkCMnbwUg\\/eFKmfXvXjdht5Pf06HR1HWgOtpqGnqs*-.VU0gWPabBmI5xQGY8j7... | {"duration_seconds": 284.48, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 8} | 0 | 0 | ["", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1355 | [
"{\"timestamp\":\"1642082128515\",\"no_\":\"563\",\"time\":\"2082.789286\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x8d96 A 3x6-.34-.n2EU3\\/RhYGJoZp\\/YUoemh7s\\/vLlyjoX4l6t*o1tVnq4vKxBmJvqw1KVqQSUc-.BXQItFW8JxBBdgDx2... | {"duration_seconds": 237.4, "host": "attacker_0", "hour": 13, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 7} | 0 | 0 | ["", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1400 | [
"{\"timestamp\":\"1642082412004\",\"no_\":\"642\",\"time\":\"2366.277551\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x06e5 A 3x6-.52-.z9h591Ghfp7CXuj7gG1QhmRi3tV7aSZ2I9*aIEdoftbsecqmKd9uGYk\\/gQsJ-.tDCtWd273lpQnxxVmzja796weJXSQW... | {"duration_seconds": 280.869, "host": "attacker_0", "hour": 14, "is_weekend": false, "log_types": ["dnsteal"], "n_logs": 30} | 0 | 0 | ["", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", "", ""] | session | false | log-sessions-supervised |
attacker_0_20220113_1405 | ["{\"timestamp\":\"1642082702529\",\"no_\":\"10911\",\"time\":\"2656.803484\",\"source\":\"<IP:a065a(...TRUNCATED) | "{\"duration_seconds\": 261.497, \"host\": \"attacker_0\", \"hour\": 14, \"is_weekend\": false, \"lo(...TRUNCATED) | 0 | 0 | "[\"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"(...TRUNCATED) | session | false | log-sessions-supervised |
YAML Metadata Warning:empty or missing yaml metadata in repo card
Check out the documentation for more information.
LogAtlas-Defense-Set 🛡️🦊
A heterogeneous, labeled log dataset designed for training and evaluating log-level and session-level classifiers that distinguish between normal behavior and cyberattacks across multiple sources (system, network, and application logs). It is intended as the “defense layer” of the LogAtlas ecosystem, focusing on robust, realistic attack detection under varied class distributions.
Mascot
The LogAtlas-Defense-Set mascot is a vigilant cyber guardian fox in lightweight futuristic armor, standing on a shield made of interlocking log fragments with threat heatmaps. Its glowing tail traces highlight red “attack” regions in the log landscape, symbolizing precise and efficient detection of malicious activity in heterogeneous logs.
Dataset Overview
- Goal: Supervised training and evaluation of models that classify log sessions as normal or attack and support downstream severity-aware analysis.
- Scope: Multi-source logs (e.g., system, network, application) organized into sessions with rich metadata, including attack ratios and severity labels.
- Use cases:
- Training LLM-based or transformer-based detectors
- Benchmarking attack detection under different class distributions
- Studying severity-aware or source-aware threat modeling
- Downloads last month
- 17
