chYassine's picture
update readme
69caf7e verified
---
dataset_info:
features:
- name: _raw
dtype: string
- name: Type
dtype: string
- name: CVSS
dtype: string
- name: Score
dtype: float64
splits:
- name: data
num_bytes: 8940142
num_examples: 18842
download_size: 2012662
dataset_size: 8940142
configs:
- config_name: default
data_files:
- split: data
path: data/data-*
license: apache-2.0
---
# Web Access Logs Dataset
## Overview
This dataset contains web access logs, including information about various types of cyber attacks. It includes details on the type of attack (if any), the CVSS (Common Vulnerability Scoring System) metrics representing the risk of the attack, and a score indicating the percentage of risk.
## Dataset Details
- **Number of rows**: 18,842
- **Number of distinct types of attacks**: 7
- **Total number of tokens**: 420,098
### Columns
- **Type**: The name of the cyber attack. If the log is not an attack, this field is null.
- **CVSS**: The CVSS metrics representing the risk of the attack.
- **Score**: The percentage of risk.
### Attack Types
The dataset includes the following types of attacks:
- Local File Inclusion (LFI)
- Server-Side Template Injection (SSTI)
- SQL Injection
- Cross-Site Scripting (XSS)
- Server-Side Request Forgery (SSRF)
- File Upload
- Cross-Site Request Forgery (CSRF)
### Data Distribution
- **Number of rows for each type**:
- **LFI**: 3,088
- **SSTI**: 2,105
- **SQL Injection**: 1,706
- **XSS**: 648
- **SSRF**: 576
- **File Upload**: 437
- **CSRF**: 282
- **Average CVSS scores for each type**:
- **CSRF**: 7.330496
- **LFI**: 5.470887
- **SSRF**: 3.102091
- **SSTI**: 4.605653
- **SQL Injection**: 2.921043
- **XSS**: 1.221296
- **File Upload**: 5.024256
- **Median CVSS scores for each type**:
- **CSRF**: 8.5
- **LFI**: 5.5
- **SSRF**: 2.7
- **SSTI**: 5.5
- **SQL Injection**: 2.7
- **XSS**: 1.0
- **File Upload**: 5.5
## Usage
This dataset is useful for analyzing web security threats and understanding the distribution and severity of different types of cyber attacks. It can be used for machine learning tasks such as anomaly detection, risk assessment, and security analysis.
## License
This dataset is provided under the [Apache license 2.0].
## Contact
For any questions or issues, please contact [[email protected]].