| --- |
| license: cc-by-4.0 |
| task_categories: |
| - tabular-classification |
| - text-classification |
| language: |
| - en |
| tags: |
| - synthetic |
| - cybersecurity |
| - edr |
| - soc |
| - malware |
| - intrusion-detection |
| - adversarial-ml |
| pretty_name: Solstice Nemesis Cyber Adversarial Traces |
| size_categories: |
| - n<1K |
| configs: |
| - config_name: traces |
| data_files: |
| - split: train |
| path: data/traces/train.parquet |
| --- |
| |
| # Solstice Nemesis Cyber Adversarial Traces |
|
|
| **High-fidelity synthetic cybersecurity event traces for SOC and EDR model training.** This public sample contains 500 synthetic security trace rows simulating adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes. |
|
|
| Built by [Solstice AI Studio](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code. |
|
|
| ## What makes this different |
| Most public cybersecurity datasets are static snapshots of IP traffic. **Nemesis** focuses on the **decision logic** of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers. |
|
|
| ## What's in the box |
| - **Decision Traces (`traces`):** 500 deep-dive traces of adversarial sequences that were blocked by simulated EDR logic. |
|
|
| ## Use Cases |
| - **EDR Rule Benchmarking:** Test the efficacy of detection rules against high-fidelity synthetic anomalies. |
| - **Cybersecurity LLM Training:** Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious. |
| - **SOC Analyst Training:** Populate training environments with realistic alert sequences. |
|
|
| ## Data Provenance |
| Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment. |
|
|
| ## Get the Full Pack |
| Scale this dataset to 2.5M+ or 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns. |
| [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets) |
|
|