File size: 2,260 Bytes
bda99fd
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
---
license: cc-by-4.0
task_categories:
  - tabular-classification
  - text-classification
language:
  - en
tags:
  - synthetic
  - cybersecurity
  - edr
  - soc
  - malware
  - intrusion-detection
  - adversarial-ml
pretty_name: Solstice Nemesis Cyber Adversarial Traces
size_categories:
  - n<1K
configs:
  - config_name: traces
    data_files:
      - split: train
        path: data/traces/train.parquet
---

# Solstice Nemesis Cyber Adversarial Traces

**High-fidelity synthetic cybersecurity event traces for SOC and EDR model training.** This public sample contains 500 synthetic security trace rows simulating adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes.

Built by [Solstice AI Studio](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code.

## What makes this different
Most public cybersecurity datasets are static snapshots of IP traffic. **Nemesis** focuses on the **decision logic** of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers.

## What's in the box
- **Decision Traces (`traces`):** 500 deep-dive traces of adversarial sequences that were blocked by simulated EDR logic.

## Use Cases
- **EDR Rule Benchmarking:** Test the efficacy of detection rules against high-fidelity synthetic anomalies.
- **Cybersecurity LLM Training:** Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious.
- **SOC Analyst Training:** Populate training environments with realistic alert sequences.

## Data Provenance
Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment.

## Get the Full Pack
Scale this dataset to 2.5M+ or 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns.
[www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets)