Update README.md
Browse files
README.md
CHANGED
@@ -7,124 +7,69 @@ size_categories:
|
|
7 |
- 10K<n<100K
|
8 |
---
|
9 |
|
10 |
-
|
11 |
|
12 |
-
|
13 |
-
<!-- language: other -->
|
14 |
-
<!-- license: mit -->
|
15 |
-
<!-- datasets: canstralian/Purple-Team-Cybersecurity-Dataset -->
|
16 |
|
17 |
-
|
18 |
-
[![Build Status](https://img.shields.io/github/actions/workflow/status/canstralian/Purple-Team-Cybersecurity-Dataset/ci.yml)](https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset/actions)
|
19 |
-
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
|
20 |
-
|
21 |
-
## Dataset Card for Purple Team Cybersecurity Dataset
|
22 |
-
|
23 |
-
**Dataset Summary**
|
24 |
-
|
25 |
-
The Purple Team Cybersecurity Dataset is a comprehensive collection of events that amalgamates Red Team (attack) and Blue Team (defense) data. This dataset is designed to facilitate research and development in cybersecurity, particularly in understanding and analyzing the interplay between offensive and defensive strategies. It includes standardized fields such as timestamps, IP addresses, MITRE ATT&CK IDs, tool names, and event descriptions, providing a balanced perspective of both attack and defense scenarios.
|
26 |
-
|
27 |
-
### Dataset Details
|
28 |
-
|
29 |
-
**Dataset Description**
|
30 |
-
|
31 |
-
This dataset was curated by combining existing Red Team and Blue Team datasets, normalizing and standardizing the data to ensure consistency. Each event is labeled as either “Attack” or “Defense” and is mapped to the corresponding MITRE ATT&CK tactics. The dataset aims to support cybersecurity research by providing a balanced and comprehensive view of both offensive and defensive events.
|
32 |
-
- Curated by: Canstralian
|
33 |
-
- Language(s) (NLP): Not Applicable
|
34 |
-
- License: MIT License
|
35 |
-
|
36 |
-
Dataset Sources
|
37 |
-
- Repository: [https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset](https://github.com/canstralian/Purple-Team-Cybersecurity-Dataset)
|
38 |
-
- Paper: [More Information Needed (Optional)]
|
39 |
-
|
40 |
-
Uses
|
41 |
-
|
42 |
-
Direct Use
|
43 |
-
|
44 |
-
This dataset is intended for use in cybersecurity research, including but not limited to:
|
45 |
-
- Analyzing attack and defense patterns
|
46 |
-
- Developing and testing intrusion detection systems
|
47 |
-
- Training machine learning models for threat detection
|
48 |
-
|
49 |
-
Out-of-Scope Use
|
50 |
-
|
51 |
-
The dataset is not suitable for:
|
52 |
-
• Real-time threat monitoring in production environments
|
53 |
-
• Any application involving sensitive or personally identifiable information
|
54 |
|
55 |
Dataset Structure
|
56 |
|
57 |
-
The dataset
|
58 |
-
|
59 |
-
|
60 |
-
|
61 |
-
|
62 |
-
|
63 |
-
|
64 |
-
|
65 |
-
|
66 |
-
|
67 |
-
|
68 |
-
|
69 |
-
|
70 |
-
|
71 |
-
|
72 |
-
|
73 |
-
|
74 |
-
|
75 |
-
|
76 |
-
|
77 |
-
|
78 |
-
|
79 |
-
|
80 |
-
|
81 |
-
|
82 |
-
|
83 |
-
|
84 |
-
|
85 |
-
|
86 |
-
|
87 |
-
|
88 |
-
|
89 |
-
|
90 |
-
|
91 |
-
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
-
|
103 |
-
|
|
|
|
|
|
|
104 |
|
105 |
Citation
|
106 |
|
107 |
-
|
108 |
-
|
109 |
-
[More Information Needed]
|
110 |
-
|
111 |
-
APA:
|
112 |
-
|
113 |
-
[More Information Needed]
|
114 |
-
|
115 |
-
Glossary
|
116 |
-
• MITRE ATT&CK: A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
|
117 |
-
|
118 |
-
More Information
|
119 |
-
|
120 |
-
[More Information Needed]
|
121 |
-
|
122 |
-
Dataset Card Authors
|
123 |
-
|
124 |
-
**Author**: Canstralian
|
125 |
-
- **GitHub**: [https://github.com/canstralian](https://github.com/canstralian)
|
126 |
-
- **Hugging Face**: [https://huggingface.co/canstralian](https://huggingface.co/canstralian)
|
127 |
-
|
128 |
-
Dataset Card Contact
|
129 |
|
130 |
-
|
|
|
|
|
|
7 |
- 10K<n<100K
|
8 |
---
|
9 |
|
10 |
+
Dataset Card for Purple Team Cybersecurity Dataset
|
11 |
|
12 |
+
Dataset Summary
|
|
|
|
|
|
|
13 |
|
14 |
+
The Purple Team Cybersecurity Dataset is a synthetic collection designed to simulate collaborative cybersecurity exercises, integrating offensive (Red Team) and defensive (Blue Team) strategies. It encompasses detailed records of attack events, defense responses, system logs, network traffic, and performance metrics. This dataset serves as a valuable resource for training, analysis, and enhancing organizational security postures.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15 |
|
16 |
Dataset Structure
|
17 |
|
18 |
+
The dataset is organized into the following primary components:
|
19 |
+
1. Attack Events (Red Team)
|
20 |
+
• event_id (INT): Unique identifier for each attack event.
|
21 |
+
• timestamp (DATETIME): Date and time of the attack event.
|
22 |
+
• attack_technique (STRING): MITRE ATT&CK technique used.
|
23 |
+
• attack_category (STRING): Category of attack (e.g., Initial Access, Execution).
|
24 |
+
• target_system (STRING): System or application targeted.
|
25 |
+
• success_status (BOOLEAN): Indicates whether the attack was successful.
|
26 |
+
2. Defense Responses (Blue Team)
|
27 |
+
• response_id (INT): Unique identifier for each defense response.
|
28 |
+
• event_id (INT): Foreign key linking to the attack event.
|
29 |
+
• detection_time (DATETIME): Timestamp when the attack was detected.
|
30 |
+
• response_time (DATETIME): Timestamp when the response was initiated.
|
31 |
+
• detection_method (STRING): Method of detection (e.g., SIEM, IDS).
|
32 |
+
• response_action (STRING): Action taken to mitigate the attack.
|
33 |
+
• effectiveness (INT): Effectiveness score (1-10) of the response.
|
34 |
+
3. System Logs
|
35 |
+
• log_id (INT): Unique identifier for each log entry.
|
36 |
+
• event_id (INT): Foreign key linking to the attack event.
|
37 |
+
• timestamp (DATETIME): Date and time of the log entry.
|
38 |
+
• log_source (STRING): Source of the log (e.g., Windows Event, Syslog).
|
39 |
+
• log_type (STRING): Type of log (e.g., Security, Application).
|
40 |
+
• log_message (TEXT): Full content of the log message.
|
41 |
+
4. Network Traffic
|
42 |
+
• traffic_id (INT): Unique identifier for each traffic record.
|
43 |
+
• event_id (INT): Foreign key linking to the attack event.
|
44 |
+
• timestamp (DATETIME): Date and time of the network traffic.
|
45 |
+
• source_ip (STRING): Source IP address.
|
46 |
+
• destination_ip (STRING): Destination IP address.
|
47 |
+
• protocol (STRING): Network protocol used.
|
48 |
+
• port (INT): Port number.
|
49 |
+
• payload_size (INT): Size of the data payload in bytes.
|
50 |
+
5. Performance Metrics
|
51 |
+
• metric_id (INT): Unique identifier for each metric entry.
|
52 |
+
• event_id (INT): Foreign key linking to the attack event.
|
53 |
+
• detection_time_seconds (INT): Time taken to detect the attack in seconds.
|
54 |
+
• response_time_seconds (INT): Time taken to respond to the attack in seconds.
|
55 |
+
• false_positive_rate (FLOAT): Rate of false positives in detection.
|
56 |
+
• missed_detection_rate (FLOAT): Rate of attacks not detected.
|
57 |
+
|
58 |
+
Intended Uses
|
59 |
+
|
60 |
+
This dataset is intended for:
|
61 |
+
• Training: Developing and refining cybersecurity defense and response strategies.
|
62 |
+
• Analysis: Studying attack patterns and evaluating defense mechanisms.
|
63 |
+
• Simulation: Creating realistic scenarios for cybersecurity drills and exercises.
|
64 |
+
|
65 |
+
Source and Licensing
|
66 |
+
|
67 |
+
This dataset is hosted on Hugging Face by Canstralian. For licensing information, please refer to the repository’s README.md file.
|
68 |
|
69 |
Citation
|
70 |
|
71 |
+
If you utilize this dataset in your research or projects, please provide appropriate credit to the creators as specified in the repository.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
72 |
|
73 |
+
For further guidance on creating dataset cards, you can refer to the Hugging Face documentation:
|
74 |
+
• Create a dataset card
|
75 |
+
• Dataset Cards
|