cyberforge-datasets / metadata.json
Che237's picture
Upload metadata.json with huggingface_hub
9232cb3 verified
Invalid JSON: Expected property name or '}' in JSON at line 2, column 1
{
<<<<<<< Updated upstream
"malware_detection": {
"name": "Malware Detection Dataset",
"description": "Collection of malware samples and features for detection",
"url": "https://raw.githubusercontent.com/Haggai-dev665/cybersecurity-datasets/main/malware_detection_sample.csv",
"backup_urls": [
"https://github.com/fabriceyhc/SilkRoad/raw/master/data/sr2_drugs_A_Z.csv",
"https://raw.githubusercontent.com/rshipp/awesome-malware-analysis/master/README.md"
],
"type": "malware",
"size_mb": 15,
"samples": 10000,
"features": [
"file_hash",
"file_size",
"entropy",
"pe_sections",
"imports",
"exports",
"strings_count",
"is_malware"
],
"downloaded_at": "2025-08-24T04:08:53.231337",
"status": "available",
"local_path": "..\\datasets\\malware_detection"
},
"network_intrusion": {
"name": "Network Intrusion Detection",
"description": "Network traffic data for intrusion detection - NSL-KDD Dataset",
"url": "https://raw.githubusercontent.com/defcom17/NSL_KDD/master/KDDTrain%2B.csv",
"backup_urls": [
"https://github.com/jmnwong/NSL-KDD-Dataset/raw/master/KDDTrain%2B.csv",
"https://www.unb.ca/cic/datasets/nsl.html"
],
"type": "network",
"size_mb": 25,
"samples": 125973,
=======
"network_intrusion": {
"name": "Network Intrusion Detection",
"description": "Network traffic data for intrusion detection",
"url": "http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz",
"type": "network",
"size_mb": 75,
"samples": 494021,
>>>>>>> Stashed changes
"features": [
"duration",
"protocol_type",
"service",
"flag",
"src_bytes",
<<<<<<< Updated upstream
"dst_bytes",
"land",
"wrong_fragment",
"urgent"
],
"downloaded_at": "2025-08-24T04:13:30.389265",
=======
"dst_bytes"
],
"downloaded_at": "2025-08-24T03:00:40.259137",
>>>>>>> Stashed changes
"status": "available",
"local_path": "..\\datasets\\network_intrusion"
},
"phishing_detection": {
"name": "Phishing Website Detection",
"description": "Features extracted from websites for phishing detection",
<<<<<<< Updated upstream
"url": "https://raw.githubusercontent.com/shreyagopal/Phishing-Website-Detection-by-Machine-Learning-Techniques/master/dataset.csv",
"backup_urls": [
"https://github.com/ebubekirbbr/pdd/raw/master/Phishing_Legitimate_full.csv"
],
"type": "phishing",
"size_mb": 8,
=======
"url": "https://archive.ics.uci.edu/ml/machine-learning-databases/00327/Training%20Dataset.arff",
"type": "phishing",
"size_mb": 12,
>>>>>>> Stashed changes
"samples": 11055,
"features": [
"url_length",
"num_dots",
"subdomain_level",
"https",
<<<<<<< Updated upstream
"shortening_service",
"prefix_suffix",
"result"
],
"downloaded_at": "2025-08-24T04:13:51.358553",
=======
"shortening_service"
],
"downloaded_at": "2025-08-24T03:00:53.776547",
>>>>>>> Stashed changes
"status": "available",
"local_path": "..\\datasets\\phishing_detection"
},
"spam_detection": {
"name": "Spam Email Detection",
"description": "Email features for spam classification",
<<<<<<< Updated upstream
"url": "https://raw.githubusercontent.com/MWiechmann/enron_spam_data/master/enron_spam_data.csv",
"backup_urls": [
"https://github.com/jbrownlee/Datasets/raw/master/spambase.csv"
],
=======
"url": "https://archive.ics.uci.edu/ml/machine-learning-databases/spambase/spambase.data",
>>>>>>> Stashed changes
"type": "spam",
"size_mb": 5,
"samples": 4601,
"features": [
"word_freq_make",
"word_freq_address",
"word_freq_all",
"char_freq_$",
<<<<<<< Updated upstream
"capital_run_avg",
"is_spam"
],
"downloaded_at": "2025-08-24T04:14:02.230888",
"status": "available",
"local_path": "..\\datasets\\spam_detection"
},
"botnet_detection": {
"name": "Botnet Traffic Detection",
"description": "Network flows for botnet detection - CICIDS Dataset",
"url": "https://raw.githubusercontent.com/AhmadMamduhh/CICIDS2017-Dataset/main/MachineLearningCVE/Friday-WorkingHours-Afternoon-DDos.pcap_ISCX.csv",
"backup_urls": [
"https://github.com/RUCD/CICIDS2017_ML/raw/master/dataset/CICIDS2017_sample.csv"
],
"type": "botnet",
"size_mb": 50,
"samples": 80000,
"features": [
"flow_duration",
"total_fwd_packets",
"total_bwd_packets",
"flow_bytes_s",
"flow_packets_s",
"label"
],
"downloaded_at": "2025-08-24T04:15:19.808350",
"status": "available",
"local_path": "..\\datasets\\botnet_detection"
},
"vulnerability_assessment": {
"name": "CVE Vulnerability Database",
"description": "Common Vulnerabilities and Exposures database entries",
"url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/0xxx/CVE-2023-0001.json",
"backup_urls": [
"https://raw.githubusercontent.com/olbat/nvdcve/master/nvdcve/cve_feeds.py"
],
"type": "vulnerability",
"size_mb": 20,
"samples": 5000,
=======
"capital_run_avg"
],
"downloaded_at": "2025-08-24T03:01:05.413316",
"status": "available",
"local_path": "..\\datasets\\spam_detection"
},
"vulnerability_assessment": {
"name": "Vulnerability Assessment Data",
"description": "System vulnerabilities and CVE data",
"url": "https://cve.mitre.org/data/downloads/allitems.csv",
"type": "vulnerability",
"size_mb": 80,
"samples": 200000,
>>>>>>> Stashed changes
"features": [
"cve_id",
"description",
"severity",
<<<<<<< Updated upstream
"cvss_score",
"attack_vector",
"attack_complexity"
],
"downloaded_at": "2025-08-24T04:15:31.245378",
=======
"impact",
"exploitability"
],
"downloaded_at": "2025-08-24T03:05:15.065965",
>>>>>>> Stashed changes
"status": "available",
"local_path": "..\\datasets\\vulnerability_assessment"
},
"threat_intelligence": {
"name": "Threat Intelligence Feeds",
<<<<<<< Updated upstream
"description": "Malicious IP addresses and indicators of compromise",
"url": "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt",
"backup_urls": [
"https://github.com/firehol/blocklist-ipsets/raw/master/firehol_level1.netset"
],
"type": "threat_intel",
"size_mb": 5,
"samples": 15000,
=======
"description": "IOCs and threat indicators",
"url": "https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt",
"type": "threat_intel",
"size_mb": 25,
"samples": 50000,
>>>>>>> Stashed changes
"features": [
"ip_address",
"threat_type",
"confidence",
"first_seen",
<<<<<<< Updated upstream
"last_seen",
"source"
],
"downloaded_at": "2025-08-24T04:15:57.202336",
"status": "available",
"local_path": "..\\datasets\\threat_intelligence"
},
"anomaly_detection": {
"name": "System Anomaly Detection",
"description": "System logs and behavior for anomaly detection",
"url": "https://raw.githubusercontent.com/logpai/loghub/master/Windows/Windows_2k.log_structured.csv",
"backup_urls": [
"https://github.com/elastic/examples/raw/master/Machine%20Learning/Security%20Analytics/suspicious_login_data.csv"
],
"type": "anomaly",
"size_mb": 30,
"samples": 25000,
"features": [
"timestamp",
"event_id",
"user",
"action",
"resource",
"status",
"anomaly_score"
],
"downloaded_at": "2025-08-24T04:16:34.439455",
"status": "available",
"local_path": "..\\datasets\\anomaly_detection"
},
"dns_tunneling": {
"name": "DNS Tunneling Detection",
"description": "DNS queries analysis for detecting tunneling attacks",
"url": "https://raw.githubusercontent.com/Yara-Rules/rules/master/malware/APT_DNS_Tunneling.yar",
"backup_urls": [
"https://github.com/gamelinux/passivedns/archive/master.zip"
],
"type": "dns",
"size_mb": 15,
"samples": 10000,
=======
"last_seen"
],
"downloaded_at": "2025-08-24T03:07:20.977810",
"status": "available",
"local_path": "..\\datasets\\threat_intelligence"
},
"dns_tunneling": {
"name": "DNS Tunneling Detection",
"description": "DNS queries for tunneling detection",
"url": "https://github.com/gamelinux/passivedns/archive/master.zip",
"type": "dns",
"size_mb": 100,
"samples": 150000,
>>>>>>> Stashed changes
"features": [
"query_name",
"query_type",
"response_code",
"query_length",
<<<<<<< Updated upstream
"subdomain_count",
"is_tunneling"
],
"downloaded_at": "2025-08-24T04:17:07.702230",
"status": "available",
"local_path": "..\\datasets\\dns_tunneling"
},
"web_attack_detection": {
"name": "Web Application Attack Detection",
"description": "HTTP requests classified for web attack detection",
"url": "https://raw.githubusercontent.com/cure53/HTTPLeaks/master/payloads.txt",
"backup_urls": [
"https://github.com/foospidy/payloads/raw/master/other/injection/sql_injection/payloads.txt"
],
"type": "web_attack",
"size_mb": 12,
"samples": 8000,
"features": [
"request_method",
"url",
"payload",
"user_agent",
"response_code",
"is_attack"
],
"downloaded_at": "2025-08-24T04:17:27.205436",
"status": "available",
"local_path": "..\\datasets\\web_attack_detection"
=======
"subdomain_count"
],
"downloaded_at": "2025-08-24T03:09:42.432718",
"status": "available",
"local_path": "..\\datasets\\dns_tunneling"
},
"cryptomining_detection": {
"name": "Cryptocurrency Mining Detection",
"description": "System behavior patterns for cryptomining detection",
"url": "https://github.com/JPCERTCC/MalConfScan/archive/master.zip",
"type": "cryptomining",
"size_mb": 60,
"samples": 30000,
"features": [
"cpu_usage",
"memory_usage",
"network_connections",
"process_behavior",
"file_modifications"
],
"downloaded_at": "2025-08-24T03:10:20.625272",
"status": "available",
"local_path": "..\\datasets\\cryptomining_detection"
>>>>>>> Stashed changes
}
}