solsticestudioai commited on
Commit
655e036
·
verified ·
1 Parent(s): 8b71359

Initial upload of Nemesis Cyber Traces sample

Browse files
Files changed (2) hide show
  1. README.md +53 -0
  2. data/traces/train.parquet +3 -0
README.md ADDED
@@ -0,0 +1,53 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: cc-by-4.0
3
+ task_categories:
4
+ - tabular-classification
5
+ - text-classification
6
+ language:
7
+ - en
8
+ tags:
9
+ - synthetic
10
+ - cybersecurity
11
+ - edr
12
+ - soc
13
+ - malware
14
+ - intrusion-detection
15
+ - adversarial-ml
16
+ pretty_name: Solstice Nemesis Cyber Adversarial Traces
17
+ size_categories:
18
+ - 1M<n<10M
19
+ configs:
20
+ - config_name: main
21
+ data_files:
22
+ - split: train
23
+ path: data/main/train.parquet
24
+ - config_name: traces
25
+ data_files:
26
+ - split: train
27
+ path: data/traces/train.parquet
28
+ ---
29
+
30
+ # Solstice Nemesis Cyber Adversarial Traces
31
+
32
+ **High-fidelity synthetic cybersecurity event traces for SOC and EDR model training.** This dataset contains 2.5 million synthetic security events simulating realistic adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes.
33
+
34
+ Built by [Solstice AI Studio](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code.
35
+
36
+ ## What makes this different
37
+ Most public cybersecurity datasets are static snapshots of IP traffic. **Nemesis** focuses on the **decision logic** of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers.
38
+
39
+ ## What's in the box
40
+ - **Main Event Stream (`main`):** 2.5M rows of EDR-style telemetry events.
41
+ - **Decision Traces (`traces`):** Deep-dive traces of specific adversarial sequences that were blocked by simulated EDR logic.
42
+
43
+ ## Use Cases
44
+ - **EDR Rule Benchmarking:** Test the efficacy of detection rules against high-fidelity synthetic anomalies.
45
+ - **Cybersecurity LLM Training:** Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious.
46
+ - **SOC Analyst Training:** Populate training environments with realistic alert sequences.
47
+
48
+ ## Data Provenance
49
+ Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment.
50
+
51
+ ## Get the Full Pack
52
+ Scale this dataset to 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns.
53
+ [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets)
data/traces/train.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4b00e415c6c0ebe0d0c3c985162adb8a693be197993e8a6af3a6f3f87fc58352
3
+ size 31381