Update README.md
Browse files
README.md
CHANGED
@@ -4,6 +4,7 @@ language:
|
|
4 |
- en
|
5 |
pretty_name: Purple Team Cybersecurity Dataset
|
6 |
---
|
|
|
7 |
# Purple Team Cybersecurity Dataset
|
8 |
|
9 |
<!-- Hugging Face Metadata -->
|
@@ -21,30 +22,27 @@ pretty_name: Purple Team Cybersecurity Dataset
|
|
21 |
|
22 |
The Purple Team Cybersecurity Dataset is a comprehensive collection of events that amalgamates Red Team (attack) and Blue Team (defense) data. This dataset is designed to facilitate research and development in cybersecurity, particularly in understanding and analyzing the interplay between offensive and defensive strategies. It includes standardized fields such as timestamps, IP addresses, MITRE ATT&CK IDs, tool names, and event descriptions, providing a balanced perspective of both attack and defense scenarios.
|
23 |
|
24 |
-
Dataset Details
|
25 |
|
26 |
-
Dataset Description
|
27 |
|
28 |
This dataset was curated by combining existing Red Team and Blue Team datasets, normalizing and standardizing the data to ensure consistency. Each event is labeled as either “Attack” or “Defense” and is mapped to the corresponding MITRE ATT&CK tactics. The dataset aims to support cybersecurity research by providing a balanced and comprehensive view of both offensive and defensive events.
|
29 |
-
|
30 |
-
|
31 |
-
|
32 |
-
• Language(s) (NLP): Not Applicable
|
33 |
-
• License: [Specify License, e.g., MIT License]
|
34 |
|
35 |
Dataset Sources
|
36 |
-
|
37 |
-
|
38 |
-
• Demo [optional]: [Link to Demo]
|
39 |
|
40 |
Uses
|
41 |
|
42 |
Direct Use
|
43 |
|
44 |
This dataset is intended for use in cybersecurity research, including but not limited to:
|
45 |
-
|
46 |
-
|
47 |
-
|
48 |
|
49 |
Out-of-Scope Use
|
50 |
|
|
|
4 |
- en
|
5 |
pretty_name: Purple Team Cybersecurity Dataset
|
6 |
---
|
7 |
+
|
8 |
# Purple Team Cybersecurity Dataset
|
9 |
|
10 |
<!-- Hugging Face Metadata -->
|
|
|
22 |
|
23 |
The Purple Team Cybersecurity Dataset is a comprehensive collection of events that amalgamates Red Team (attack) and Blue Team (defense) data. This dataset is designed to facilitate research and development in cybersecurity, particularly in understanding and analyzing the interplay between offensive and defensive strategies. It includes standardized fields such as timestamps, IP addresses, MITRE ATT&CK IDs, tool names, and event descriptions, providing a balanced perspective of both attack and defense scenarios.
|
24 |
|
25 |
+
### Dataset Details
|
26 |
|
27 |
+
**Dataset Description**
|
28 |
|
29 |
This dataset was curated by combining existing Red Team and Blue Team datasets, normalizing and standardizing the data to ensure consistency. Each event is labeled as either “Attack” or “Defense” and is mapped to the corresponding MITRE ATT&CK tactics. The dataset aims to support cybersecurity research by providing a balanced and comprehensive view of both offensive and defensive events.
|
30 |
+
- Curated by: [Your Name or Organization]
|
31 |
+
- Language(s) (NLP): Not Applicable
|
32 |
+
- License: [MIT License]
|
|
|
|
|
33 |
|
34 |
Dataset Sources
|
35 |
+
- Repository: [Link to Dataset Repository]
|
36 |
+
- Paper [optional]: [Link to Related Paper]
|
|
|
37 |
|
38 |
Uses
|
39 |
|
40 |
Direct Use
|
41 |
|
42 |
This dataset is intended for use in cybersecurity research, including but not limited to:
|
43 |
+
- Analyzing attack and defense patterns
|
44 |
+
- Developing and testing intrusion detection systems
|
45 |
+
- Training machine learning models for threat detection
|
46 |
|
47 |
Out-of-Scope Use
|
48 |
|