Canstralian commited on
Commit
5bb43a8
·
verified ·
1 Parent(s): d1dd95c

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +57 -112
README.md CHANGED
@@ -7,124 +7,69 @@ size_categories:
7
  - 10K<n<100K
8
  ---
9
 
10
- # Purple Team Cybersecurity Dataset
11
 
12
- <!-- Hugging Face Metadata -->
13
- <!-- language: other -->
14
- <!-- license: mit -->
15
- <!-- datasets: canstralian/Purple-Team-Cybersecurity-Dataset -->
16
 
17
- <!-- Badges -->
18
- [![Build Status](https://img.shields.io/github/actions/workflow/status/canstralian/Purple-Team-Cybersecurity-Dataset/ci.yml)](https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset/actions)
19
- [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
20
-
21
- ## Dataset Card for Purple Team Cybersecurity Dataset
22
-
23
- **Dataset Summary**
24
-
25
- The Purple Team Cybersecurity Dataset is a comprehensive collection of events that amalgamates Red Team (attack) and Blue Team (defense) data. This dataset is designed to facilitate research and development in cybersecurity, particularly in understanding and analyzing the interplay between offensive and defensive strategies. It includes standardized fields such as timestamps, IP addresses, MITRE ATT&CK IDs, tool names, and event descriptions, providing a balanced perspective of both attack and defense scenarios.
26
-
27
- ### Dataset Details
28
-
29
- **Dataset Description**
30
-
31
- This dataset was curated by combining existing Red Team and Blue Team datasets, normalizing and standardizing the data to ensure consistency. Each event is labeled as either “Attack” or “Defense” and is mapped to the corresponding MITRE ATT&CK tactics. The dataset aims to support cybersecurity research by providing a balanced and comprehensive view of both offensive and defensive events.
32
- - Curated by: Canstralian
33
- - Language(s) (NLP): Not Applicable
34
- - License: MIT License
35
-
36
- Dataset Sources
37
- - Repository: [https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset](https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset)
38
- - Paper: [More Information Needed (Optional)]
39
-
40
- Uses
41
-
42
- Direct Use
43
-
44
- This dataset is intended for use in cybersecurity research, including but not limited to:
45
- - Analyzing attack and defense patterns
46
- - Developing and testing intrusion detection systems
47
- - Training machine learning models for threat detection
48
-
49
- Out-of-Scope Use
50
-
51
- The dataset is not suitable for:
52
- • Real-time threat monitoring in production environments
53
- • Any application involving sensitive or personally identifiable information
54
 
55
  Dataset Structure
56
 
57
- The dataset comprises events with the following fields:
58
- Timestamp: ISO 8601 formatted date and time
59
- Source_IP: Validated source IP address
60
- Destination_IP: Validated destination IP address
61
- MITRE_ATT&CK_ID: Standardized MITRE ATT&CK technique ID
62
- Tool_Name: Standardized name of the tool used
63
- Event_Description: Detailed description of the event
64
- Event_Type: Label indicating “Attack” or “Defense”
65
- MITRE_Tactic: Mapped MITRE ATT&CK tactic
66
-
67
- Dataset Creation
68
-
69
- Curation Rationale
70
-
71
- The dataset was created to provide a balanced and comprehensive resource for cybersecurity professionals and researchers, enabling the study of both attack and defense mechanisms within a unified framework.
72
-
73
- Source Data
74
-
75
- Data Collection and Processing
76
-
77
- Data was collected from existing Red Team and Blue Team datasets, followed by normalization and standardization processes to ensure consistency across fields. Events were labeled and mapped to MITRE ATT&CK tactics to facilitate structured analysis.
78
-
79
- Who are the source data producers?
80
-
81
- The original data was produced by various cybersecurity teams and organizations engaged in offensive and defensive security operations.
82
-
83
- Annotations
84
-
85
- Annotation process
86
-
87
- Events were labeled as “Attack” or “Defense” based on their origin and nature. Each event was mapped to the corresponding MITRE ATT&CK tactic using a predefined mapping.
88
-
89
- Who are the annotators?
90
-
91
- The annotation was performed by cybersecurity experts with experience in both offensive and defensive operations.
92
-
93
- Personal and Sensitive Information
94
-
95
- The dataset does not contain any personal or sensitive information. All IP addresses have been validated to ensure they do not correspond to real-world entities.
96
-
97
- Bias, Risks, and Limitations
98
-
99
- While efforts have been made to balance the dataset, there may still be inherent biases due to the nature of the source data. Users should be aware of these potential biases and exercise caution when applying the dataset to different contexts.
100
-
101
- Recommendations
102
-
103
- Users should be made aware of the risks, biases, and limitations of the dataset. More information needed for further recommendations.
 
 
 
104
 
105
  Citation
106
 
107
- BibTeX:
108
-
109
- [More Information Needed]
110
-
111
- APA:
112
-
113
- [More Information Needed]
114
-
115
- Glossary
116
- • MITRE ATT&CK: A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
117
-
118
- More Information
119
-
120
- [More Information Needed]
121
-
122
- Dataset Card Authors
123
-
124
- **Author**: Canstralian
125
- - **GitHub**: [https://github.com/canstralian](https://github.com/canstralian)
126
- - **Hugging Face**: [https://huggingface.co/canstralian](https://huggingface.co/canstralian)
127
-
128
- Dataset Card Contact
129
 
130
- **Contact Information**: [Your Contact Information (email or other contact)]
 
 
 
7
  - 10K<n<100K
8
  ---
9
 
10
+ Dataset Card for Purple Team Cybersecurity Dataset
11
 
12
+ Dataset Summary
 
 
 
13
 
14
+ The Purple Team Cybersecurity Dataset is a synthetic collection designed to simulate collaborative cybersecurity exercises, integrating offensive (Red Team) and defensive (Blue Team) strategies. It encompasses detailed records of attack events, defense responses, system logs, network traffic, and performance metrics. This dataset serves as a valuable resource for training, analysis, and enhancing organizational security postures.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
15
 
16
  Dataset Structure
17
 
18
+ The dataset is organized into the following primary components:
19
+ 1. Attack Events (Red Team)
20
+          event_id (INT): Unique identifier for each attack event.
21
+          timestamp (DATETIME): Date and time of the attack event.
22
+          attack_technique (STRING): MITRE ATT&CK technique used.
23
+          attack_category (STRING): Category of attack (e.g., Initial Access, Execution).
24
+          target_system (STRING): System or application targeted.
25
+          success_status (BOOLEAN): Indicates whether the attack was successful.
26
+ 2. Defense Responses (Blue Team)
27
+       •   response_id (INT): Unique identifier for each defense response.
28
+       •   event_id (INT): Foreign key linking to the attack event.
29
+       •   detection_time (DATETIME): Timestamp when the attack was detected.
30
+       •   response_time (DATETIME): Timestamp when the response was initiated.
31
+       •   detection_method (STRING): Method of detection (e.g., SIEM, IDS).
32
+       •   response_action (STRING): Action taken to mitigate the attack.
33
+       •   effectiveness (INT): Effectiveness score (1-10) of the response.
34
+ 3. System Logs
35
+       •   log_id (INT): Unique identifier for each log entry.
36
+       •   event_id (INT): Foreign key linking to the attack event.
37
+       •   timestamp (DATETIME): Date and time of the log entry.
38
+       •   log_source (STRING): Source of the log (e.g., Windows Event, Syslog).
39
+       •   log_type (STRING): Type of log (e.g., Security, Application).
40
+       •   log_message (TEXT): Full content of the log message.
41
+ 4. Network Traffic
42
+       •   traffic_id (INT): Unique identifier for each traffic record.
43
+       •   event_id (INT): Foreign key linking to the attack event.
44
+       •   timestamp (DATETIME): Date and time of the network traffic.
45
+       •   source_ip (STRING): Source IP address.
46
+       •   destination_ip (STRING): Destination IP address.
47
+       •   protocol (STRING): Network protocol used.
48
+       •   port (INT): Port number.
49
+       •   payload_size (INT): Size of the data payload in bytes.
50
+ 5. Performance Metrics
51
+       •   metric_id (INT): Unique identifier for each metric entry.
52
+       •   event_id (INT): Foreign key linking to the attack event.
53
+       •   detection_time_seconds (INT): Time taken to detect the attack in seconds.
54
+       •   response_time_seconds (INT): Time taken to respond to the attack in seconds.
55
+       •   false_positive_rate (FLOAT): Rate of false positives in detection.
56
+       •   missed_detection_rate (FLOAT): Rate of attacks not detected.
57
+
58
+ Intended Uses
59
+
60
+ This dataset is intended for:
61
+    •   Training: Developing and refining cybersecurity defense and response strategies.
62
+    •   Analysis: Studying attack patterns and evaluating defense mechanisms.
63
+    •   Simulation: Creating realistic scenarios for cybersecurity drills and exercises.
64
+
65
+ Source and Licensing
66
+
67
+ This dataset is hosted on Hugging Face by Canstralian. For licensing information, please refer to the repository’s README.md file.
68
 
69
  Citation
70
 
71
+ If you utilize this dataset in your research or projects, please provide appropriate credit to the creators as specified in the repository.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
72
 
73
+ For further guidance on creating dataset cards, you can refer to the Hugging Face documentation:
74
+    •   Create a dataset card
75
+    •   Dataset Cards