Canstralian's picture
Update README.md
d1dd95c verified
|
raw
history blame
5.2 kB
metadata
license: mit
language:
  - en
pretty_name: Purple Team Cybersecurity Dataset
size_categories:
  - 10K<n<100K

Purple Team Cybersecurity Dataset

Build Status License: MIT

Dataset Card for Purple Team Cybersecurity Dataset

Dataset Summary

The Purple Team Cybersecurity Dataset is a comprehensive collection of events that amalgamates Red Team (attack) and Blue Team (defense) data. This dataset is designed to facilitate research and development in cybersecurity, particularly in understanding and analyzing the interplay between offensive and defensive strategies. It includes standardized fields such as timestamps, IP addresses, MITRE ATT&CK IDs, tool names, and event descriptions, providing a balanced perspective of both attack and defense scenarios.

Dataset Details

Dataset Description

This dataset was curated by combining existing Red Team and Blue Team datasets, normalizing and standardizing the data to ensure consistency. Each event is labeled as either “Attack” or “Defense” and is mapped to the corresponding MITRE ATT&CK tactics. The dataset aims to support cybersecurity research by providing a balanced and comprehensive view of both offensive and defensive events.

  • Curated by: Canstralian
  • Language(s) (NLP): Not Applicable
  • License: MIT License

Dataset Sources

Uses

Direct Use

This dataset is intended for use in cybersecurity research, including but not limited to:

  • Analyzing attack and defense patterns
  • Developing and testing intrusion detection systems
  • Training machine learning models for threat detection

Out-of-Scope Use

The dataset is not suitable for: • Real-time threat monitoring in production environments • Any application involving sensitive or personally identifiable information

Dataset Structure

The dataset comprises events with the following fields: • Timestamp: ISO 8601 formatted date and time • Source_IP: Validated source IP address • Destination_IP: Validated destination IP address • MITRE_ATT&CK_ID: Standardized MITRE ATT&CK technique ID • Tool_Name: Standardized name of the tool used • Event_Description: Detailed description of the event • Event_Type: Label indicating “Attack” or “Defense” • MITRE_Tactic: Mapped MITRE ATT&CK tactic

Dataset Creation

Curation Rationale

The dataset was created to provide a balanced and comprehensive resource for cybersecurity professionals and researchers, enabling the study of both attack and defense mechanisms within a unified framework.

Source Data

Data Collection and Processing

Data was collected from existing Red Team and Blue Team datasets, followed by normalization and standardization processes to ensure consistency across fields. Events were labeled and mapped to MITRE ATT&CK tactics to facilitate structured analysis.

Who are the source data producers?

The original data was produced by various cybersecurity teams and organizations engaged in offensive and defensive security operations.

Annotations

Annotation process

Events were labeled as “Attack” or “Defense” based on their origin and nature. Each event was mapped to the corresponding MITRE ATT&CK tactic using a predefined mapping.

Who are the annotators?

The annotation was performed by cybersecurity experts with experience in both offensive and defensive operations.

Personal and Sensitive Information

The dataset does not contain any personal or sensitive information. All IP addresses have been validated to ensure they do not correspond to real-world entities.

Bias, Risks, and Limitations

While efforts have been made to balance the dataset, there may still be inherent biases due to the nature of the source data. Users should be aware of these potential biases and exercise caution when applying the dataset to different contexts.

Recommendations

Users should be made aware of the risks, biases, and limitations of the dataset. More information needed for further recommendations.

Citation

BibTeX:

[More Information Needed]

APA:

[More Information Needed]

Glossary • MITRE ATT&CK: A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

More Information

[More Information Needed]

Dataset Card Authors

Author: Canstralian

Dataset Card Contact

Contact Information: [Your Contact Information (email or other contact)]