solsticestudioai commited on
Commit
bda99fd
·
verified ·
1 Parent(s): 655e036

Fix missing dataset config

Browse files
Files changed (1) hide show
  1. README.md +48 -53
README.md CHANGED
@@ -1,53 +1,48 @@
1
- ---
2
- license: cc-by-4.0
3
- task_categories:
4
- - tabular-classification
5
- - text-classification
6
- language:
7
- - en
8
- tags:
9
- - synthetic
10
- - cybersecurity
11
- - edr
12
- - soc
13
- - malware
14
- - intrusion-detection
15
- - adversarial-ml
16
- pretty_name: Solstice Nemesis Cyber Adversarial Traces
17
- size_categories:
18
- - 1M<n<10M
19
- configs:
20
- - config_name: main
21
- data_files:
22
- - split: train
23
- path: data/main/train.parquet
24
- - config_name: traces
25
- data_files:
26
- - split: train
27
- path: data/traces/train.parquet
28
- ---
29
-
30
- # Solstice Nemesis Cyber Adversarial Traces
31
-
32
- **High-fidelity synthetic cybersecurity event traces for SOC and EDR model training.** This dataset contains 2.5 million synthetic security events simulating realistic adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes.
33
-
34
- Built by [Solstice AI Studio](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code.
35
-
36
- ## What makes this different
37
- Most public cybersecurity datasets are static snapshots of IP traffic. **Nemesis** focuses on the **decision logic** of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers.
38
-
39
- ## What's in the box
40
- - **Main Event Stream (`main`):** 2.5M rows of EDR-style telemetry events.
41
- - **Decision Traces (`traces`):** Deep-dive traces of specific adversarial sequences that were blocked by simulated EDR logic.
42
-
43
- ## Use Cases
44
- - **EDR Rule Benchmarking:** Test the efficacy of detection rules against high-fidelity synthetic anomalies.
45
- - **Cybersecurity LLM Training:** Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious.
46
- - **SOC Analyst Training:** Populate training environments with realistic alert sequences.
47
-
48
- ## Data Provenance
49
- Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment.
50
-
51
- ## Get the Full Pack
52
- Scale this dataset to 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns.
53
- [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets)
 
1
+ ---
2
+ license: cc-by-4.0
3
+ task_categories:
4
+ - tabular-classification
5
+ - text-classification
6
+ language:
7
+ - en
8
+ tags:
9
+ - synthetic
10
+ - cybersecurity
11
+ - edr
12
+ - soc
13
+ - malware
14
+ - intrusion-detection
15
+ - adversarial-ml
16
+ pretty_name: Solstice Nemesis Cyber Adversarial Traces
17
+ size_categories:
18
+ - n<1K
19
+ configs:
20
+ - config_name: traces
21
+ data_files:
22
+ - split: train
23
+ path: data/traces/train.parquet
24
+ ---
25
+
26
+ # Solstice Nemesis Cyber Adversarial Traces
27
+
28
+ **High-fidelity synthetic cybersecurity event traces for SOC and EDR model training.** This public sample contains 500 synthetic security trace rows simulating adversarial behavior, Endpoint Detection and Response (EDR) telemetry, and automated block outcomes.
29
+
30
+ Built by [Solstice AI Studio](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic — no real network logs or proprietary exploit code.
31
+
32
+ ## What makes this different
33
+ Most public cybersecurity datasets are static snapshots of IP traffic. **Nemesis** focuses on the **decision logic** of both the attacker and the defender. Each trace includes granular telemetry that would be seen by a modern EDR agent, including process execution, memory modification attempts, and behavioral blocking triggers.
34
+
35
+ ## What's in the box
36
+ - **Decision Traces (`traces`):** 500 deep-dive traces of adversarial sequences that were blocked by simulated EDR logic.
37
+
38
+ ## Use Cases
39
+ - **EDR Rule Benchmarking:** Test the efficacy of detection rules against high-fidelity synthetic anomalies.
40
+ - **Cybersecurity LLM Training:** Fine-tune models to interpret security logs and explain "why" a specific process sequence was flagged as malicious.
41
+ - **SOC Analyst Training:** Populate training environments with realistic alert sequences.
42
+
43
+ ## Data Provenance
44
+ Generated using Solstice’s PhantasOS / SIMA simulation engine. The simulation models attacker "personas" with varying skill levels attempting to move laterally, escalate privileges, and exfiltrate data while navigating a simulated corporate environment.
45
+
46
+ ## Get the Full Pack
47
+ Scale this dataset to 2.5M+ or 100M+ events, custom network topologies, and latest CVE-matched behavioral patterns.
48
+ [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets)