f15hb0wn's picture
Upload README.md with huggingface_hub
09b3216 verified
---
license: apache-2.0
task_categories:
- text-classification
- graph-ml
language:
- en
tags:
- cybersecurity
- intrusion-detection
- provenance-graphs
- MITRE-ATT&CK
- SOAR
- security-operations
- IDS
- network-security
- threat-detection
- labeled-dataset
- lead-rules
size_categories:
- 100M<n<1B
dataset_info:
- config_name: signals
splits:
- name: train
num_examples: 114074530
configs:
- config_name: signals
data_files:
- split: train
path: signals/*.parquet
- config_name: graph_nodes
data_files:
- split: train
path: graph/nodes.jsonl
- config_name: graph_edges
data_files:
- split: train
path: graph/edges.jsonl
- config_name: incidents
data_files:
- split: train
path: graph/incidents.jsonl
---
# WitFoo Precinct6 Cybersecurity Dataset (114M)
## Overview
A large-scale, labeled cybersecurity dataset derived from production Security Operations Center (SOC) data processed by [WitFoo Precinct](https://www.witfoo.com/) version 6.x. This dataset contains **114 million sanitized security events** (signal logs) and **provenance graphs** (10,442 incident graphs with 23,362 nodes and 32,732,650 edges) from real enterprise network monitoring across 5 organizations.
**Available in two sizes:**
- [`witfoo/precinct6-cybersecurity`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity) — 2M signals (smaller, faster to load)
- [`witfoo/precinct6-cybersecurity-100m`](https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m) — **114M signals (this dataset)**
**Generate your own:** WitFoo Precinct 6.x customers can create datasets from their own data using the open-source pipeline: [`witfoo/dataset-from-precinct6`](https://github.com/witfoo/dataset-from-precinct6)
This dataset is designed to support research in:
- **Provenance graph-based intrusion detection** (KnowHow, NodLink, and similar systems)
- **AI-driven cyber defense simulation** (CybORG and MARL-based defense policy training)
- **Security alert classification** (malicious vs. suspicious vs. benign event labeling)
- **Attack lifecycle analysis** using MITRE ATT&CK framework mappings
- **Detection rule evaluation** using WitFoo's 261 lead detection rules
## Quick Start
```python
from datasets import load_dataset
# Load flat signal logs (114M rows across 58 Parquet shards)
signals = load_dataset("witfoo/precinct6-cybersecurity-100m", "signals", split="train")
# Find malicious events (from confirmed incidents)
malicious = signals.filter(lambda x: x["label_binary"] == "malicious")
# Find suspicious events (matched detection rules)
suspicious = signals.filter(lambda x: x["label_binary"] == "suspicious")
# Query by product/vendor
cisco_events = signals.filter(lambda x: x["vendor_name"] == "Cisco")
# Load provenance graph
nodes = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_nodes", split="train")
edges = load_dataset("witfoo/precinct6-cybersecurity-100m", "graph_edges", split="train")
# Load full incident graphs
incidents = load_dataset("witfoo/precinct6-cybersecurity-100m", "incidents", split="train")
```
## Label Distribution
| Label | Count | Percentage |
|-------|-------|------------|
| `benign` | 113,326,050 | 99.34% |
| `malicious` | 125,780 | 0.11% |
| `suspicious` | 622,700 | 0.55% |
## Signal Columns
| Column | Type | Description |
|--------|------|-------------|
| `timestamp` | float | Unix epoch timestamp |
| `message_type` | string | Event classification (e.g., `firewall_action`, `account_logon`, `AssumeRole`) |
| `stream_name` | string | Source product/data stream (see Source Products below) |
| `pipeline` | string | Ingestion pipeline |
| `src_ip` | string | Source IP (sanitized) |
| `dst_ip` | string | Destination IP (sanitized) |
| `src_port` | string | Source port |
| `dst_port` | string | Destination port |
| `protocol` | string | Network protocol (6=TCP, 17=UDP, 1=ICMP) |
| `src_host` | string | Source hostname (sanitized) |
| `dst_host` | string | Destination hostname (sanitized) |
| `username` | string | Associated username (sanitized) |
| `action` | string | Event action (block, permit, logon, logoff) |
| `severity` | string | Severity level |
| `vendor_code` | string | Vendor-specific event code |
| `message_sanitized` | string | Full sanitized raw log message |
| `label_binary` | string | `malicious`, `suspicious`, or `benign` |
| `label_confidence` | float | Confidence score (0.0–1.0) |
| `suspicion_score` | float | WitFoo suspicion score (0.0–1.0) |
| `mo_name` | string | Modus operandi (e.g., `Data Theft`) |
| `lifecycle_stage` | string | Kill chain stage (e.g., `initial-compromise`, `complete-mission`) |
| `matched_rules` | string | JSON array of matched WitFoo lead rule descriptions |
| `set_roles` | string | JSON array of classification roles (e.g., `Exploiting Host`, `C2 Server`) |
| `product_name` | string | Security product name (e.g., `ASA Firewall`, `Falcon`) |
| `vendor_name` | string | Product vendor (e.g., `Cisco`, `Crowdstrike`) |
## Source Products
The dataset contains events from **158 security products** across **70+ vendors**. Complete catalog in `reference/lead_rules_catalog.json`.
| Category | Products |
|----------|----------|
| **Firewalls** | Cisco ASA, Palo Alto PAN NGFW, Fortinet FortiGate, Checkpoint, Meraki, SonicWall, pfSense, Barracuda, Juniper SRX |
| **Endpoint Protection** | CrowdStrike Falcon, Symantec SEP, Carbon Black, Cylance, SentinelOne, Deep Instinct, Sophos, McAfee, ESET |
| **Network Detection** | Cisco Stealthwatch, Cisco Firepower, Suricata IDS, TippingPoint IPS, Vectra Cognito |
| **Identity & Access** | Microsoft Windows AD, Cisco ISE, Centrify, CyberArk, Duo, Okta, Beyond Trust |
| **Cloud Security** | AWS CloudTrail, AWS VPC Flow Logs, AWS GuardDuty, Azure Security, Zscaler, Netskope, Cisco Umbrella |
| **Email Security** | ProofPoint, Mimecast, FireEye EX, Barracuda ESS, Cisco IronPort, Checkpoint Harmony |
| **Threat Intelligence** | FireEye NX/HX/AX/CMS, Trend Micro, QRadar, Microsoft ATA, Cortex XDR |
| **Infrastructure** | VMware vCenter/NSX, Elastic Filebeat, Linux (sshd, PAM, systemd, auditd), Apache, HAProxy |
## Labeling Methodology
**Three-tier labels** derived from two sources:
- **`malicious`** (125,780): Events embedded as leads inside confirmed incidents. Extracted directly from incident lead objects with suspicion scores, modus operandi, and MITRE mappings.
- **`suspicious`** (622,700): Events matching WitFoo's 261 lead detection rules (e.g., "ASA Deny", "Windows Failed Login", "CrowdStrike Detection") but not in confirmed incidents.
- **`benign`** (113,326,050): Events not matching any detection rules and not in any incident.
The `matched_rules` column shows which detection rules matched. The `set_roles` column shows WitFoo classification roles (Exploiting Host, C2 Server, Staging Target, etc.).
## Lead Detection Rules
261 rules included in `reference/lead_rules_catalog.json`. Examples:
| Rule | Criteria | Roles |
|------|----------|-------|
| Blocked Action | Any firewall block | Exploiting Host → Exploiting Target |
| ASA Deny | cisco_asa + deny | Exploiting Host → Exploiting Target |
| Windows Failed Login | Event ID 4625 | Exploiting Target → Exploiting Host |
| CrowdStrike Detection | CrowdStrike stream | Exploiting Target → Exploiting Host |
| AWS VPC Reject | VPC flow + REJECT | Exploiting Host → Exploiting Target |
| Authentication Failure | auth_failure type | Exploiting Host → Exploiting Target |
| Audit log cleared | Event ID 1102 | Exploiting Target → Exploiting Host |
## Sanitization
All customer-identifying information has been removed through a comprehensive, iterative four-layer sanitization pipeline. Quality was prioritized over processing speed. The pipeline is [open source](https://github.com/witfoo/dataset-from-precinct6) under the Apache 2.0 license.
1. **Structured field sanitization + Aho-Corasick multi-pattern sweep** — Known fields are replaced with deterministic tokens (IPs to [RFC 5737](https://datatracker.ietf.org/doc/html/rfc5737) ranges, hostnames to `HOST-NNNN`, etc.). Every record is then swept using an [Aho-Corasick automaton](https://en.wikipedia.org/wiki/Aho%E2%80%93Corasick_algorithm) built from all 302,000+ registry entries to catch PII in unexpected contexts. Product identifiers are explicitly protected from the sweep.
2. **Format-specific log message parsing** — Eight specialized parsers handle Cisco ASA syslog, Windows Security Event XML, WinLogBeat JSON, AWS CloudTrail, Palo Alto Networks, VMware vCenter, DNS logs, and a generic fallback — sanitizing PII within structured fields like XML elements, nested JSON, and CSV columns.
3. **Machine learning residual detection** — [Microsoft Presidio](https://microsoft.github.io/presidio/) (spaCy NLP) and [BERT NER](https://huggingface.co/dslim/bert-base-NER) scan sanitized records for residual PII that pattern-based approaches miss. New discoveries trigger full re-sanitization.
4. **Large language model contextual review** — [Claude](https://www.anthropic.com/claude) reviews stratified samples for subtle PII: embedded org names, internal hostnames revealing organizational structure, employee names in file paths, AD group names, and geographic identifiers. Findings trigger re-sanitization.
**Iterative convergence:** The four layers run in cycles. PII discovered by ML/AI in one cycle is caught automatically by Layer 1 in all subsequent cycles across the complete dataset. Cycles repeat until near-zero new discoveries.
**Final PII registry:** ~302,000 unique mappings across 14 categories (IPs, hostnames, usernames, orgs, credentials, SIDs, emails, ARNs, etc.). All replacements are consistent — the same original value always maps to the same token, preserving graph topology.
## Graph Data
| Component | Count |
|-----------|-------|
| Nodes | 23,362 |
| Edges | 32,732,650 |
| Incidents | 10,442 (Data Theft: 10,441, Phishing: 1) |
## Limitations
- **Label imbalance**: 99.77% benign reflects production SOC reality. Sampling strategies needed for balanced training.
- **Temporal scope**: July–August 2024
- **Sanitization**: ~302,000 PII registry entries used for consistent replacement across all records
- **Shared incidents**: Same 10,442 incidents appear in both 2M and 114M datasets
- **Sanitization trade-offs**: Some log message detail reduced by PII replacement
## Citation
```bibtex
@dataset{witfoo_precinct6_100m_2025,
title={WitFoo Precinct6 Cybersecurity Dataset (114M)},
author={WitFoo, Inc.},
year={2025},
url={https://huggingface.co/datasets/witfoo/precinct6-cybersecurity-100m},
license={Apache-2.0}
}
```
## License
[Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0)