File size: 9,312 Bytes
3bed60a df49526 3bed60a df49526 3bed60a df49526 3bed60a 6d7c5d8 3bed60a | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- network-traffic
- intrusion-detection
- synthetic-data
- anomaly-detection
- apt
- c2-beacon
pretty_name: CYB001 — Synthetic Network Traffic (Sample)
size_categories:
- 1K<n<10K
---
# CYB001 — Synthetic Network Traffic Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB001-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB001 — Synthetic Network Traffic
Dataset** product. It contains roughly **1 / 60th of the full dataset** at
identical schema, label distribution, and statistical fingerprint, so you can
evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb001-baseline-classifier**](https://huggingface.co/xpertsystems/cyb001-baseline-classifier)
> — XGBoost + PyTorch MLP, copy-paste inference notebook, full metrics and
> honest limitations in the model card.
| File | Rows (sample) | Rows (full) | Description |
|-------------------------|---------------|---------------|--------------------------------------------|
| `network_topology.csv` | ~200 | ~3,200 | Network segments and defender configs |
| `session_summary.csv` | ~1000 | ~62,000 | Multi-flow session aggregates |
| `network_flows.csv` | ~9,770 | ~500,000 | Per-flow records (CICFlowMeter-compatible) |
| `flow_events.csv` | ~5,431 | ~120,000 | Per-flow security event records |
## Dataset Summary
CYB001 simulates 30 days of enterprise network traffic across **9 segment
types** (corporate LAN, DMZ, cloud workload, OT/ICS, endpoint fleet, SOC
management plane, zero-trust, guest Wi-Fi, data centre spine), with:
- **3-class labels**: `BENIGN`, `MALICIOUS`, `AMBIGUOUS`
- **19 fine-grained traffic categories** including portscan, brute-force,
SQLi, XSS, exfiltration, C2 beaconing, lateral movement, ransomware staging
- **4 attacker capability tiers**: opportunistic, targeted, APT, insider threat
- **Diurnal traffic patterns** with off-peak attack bias for APT/insider tiers
- **APT C2 beacon regularity** governed by a configurable IAT coefficient of
variation (default 0.065 → regularity score ≈ 0.93)
All IP addresses are SHA-256 pseudonyms (`IP_<12 hex>`) — no real network data.
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb001-baseline-classifier](https://huggingface.co/xpertsystems/cyb001-baseline-classifier)**.
| Component | Detail |
|---|---|
| Task | 3-class flow classification (`BENIGN` / `MALICIOUS` / `AMBIGUOUS`) |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 101 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost test accuracy 0.998, macro-F1 0.996 — synthetic; see model card for limitations |
This is a reference baseline, not a production IDS. The model card documents
the calibrated signals it picks up, an ablation showing the model is not
session-dominated, and six explicit limitations including the gap between
synthetic and real-world traffic.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics; the sample preserves
the same calibration. Observed values on this sample:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| malicious_flow_rate | 0.1720 | 0.2015 | ✓ PASS |
| c2_beacon_regularity_score | 0.7800 | 0.7673 | ✓ PASS |
| payload_entropy_benign_mean | 4.8000 | 4.8556 | ✓ PASS |
| protocol_violation_rate | 0.0150 | 0.0161 | ✓ PASS |
| scan_probe_density | 0.0430 | 0.0450 | ✓ PASS |
| exfil_volume_ratio | 0.0240 | 0.0153 | ✓ PASS |
| retransmission_rate | 0.0380 | 0.0365 | ✓ PASS |
| dns_query_rate_anomaly | 0.0620 | 0.0620 | ✓ PASS |
| lateral_move_flag_rate | 0.0310 | 0.0340 | ✓ PASS |
| session_risk_score_apt | 0.6800 | 0.6803 | ✓ PASS |
| fwd_bwd_byte_ratio_benign | 1.3400 | 1.4119 | ✓ PASS |
| tunnel_detection_rate | 0.0180 | 0.0180 | ✓ PASS |
## Schema
### `network_flows.csv` (primary file)
| Column | Type | Description |
|------------------------------|---------|----------------------------------------------|
| flow_id | string | Unique flow identifier |
| session_id | string | Parent session FK |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| destination_ip_hash | string | SHA-256 pseudonymised destination IP |
| source_port, dest_port | int | TCP/UDP port numbers |
| protocol | string | TCP / UDP / HTTPS / DNS / SMTP / SSH / etc. |
| flow_start_timestamp | string | ISO timestamp |
| flow_duration_ms | int | Flow duration in milliseconds |
| total_fwd_packets | int | Forward packet count |
| total_bwd_packets | int | Backward packet count |
| total_bytes_fwd | int | Forward byte volume |
| total_bytes_bwd | int | Backward byte volume |
| fwd_packet_len_mean / _std | int | Forward packet length statistics |
| bwd_packet_len_mean / _std | int | Backward packet length statistics |
| flow_bytes_per_sec | float | Throughput (bytes/sec) |
| flow_packets_per_sec | float | Throughput (packets/sec) |
| inter_arrival_time_mean/_std | float | IAT statistics (ms) — key C2 beacon feature |
| tcp_flag_{syn,ack,fin,rst,psh,urg}_count | int | TCP flag counts |
| flow_lifecycle_phase | string | initiation / handshake / transfer / etc. |
| traffic_category | string | 1 of 19 fine-grained categories |
| attack_subcategory | string | Attack subcategory (empty for benign) |
| **label** | string | **BENIGN / MALICIOUS / AMBIGUOUS** (target) |
| segment_id | string | FK to `network_topology.csv` |
| source_device_type | string | workstation / server / iot / mobile / cloud |
| dest_device_type | string | (same as source) |
| attacker_capability_tier | string | opportunistic / targeted / apt / insider |
| retransmission_flag | int | TCP retransmission flag |
| fragmentation_flag | int | IP fragmentation flag |
| protocol_violation_flag | int | Protocol-violation detection flag |
See `session_summary.csv`, `network_topology.csv`, and `flow_events.csv` for
the complementary aggregate, topology, and per-event schemas.
## Suggested Use Cases
- Training and evaluating **network intrusion detection** models
- Benchmarking **C2 beacon detection** algorithms (regular-IAT signatures)
- **APT behaviour modelling** with off-peak temporal bias
- **Multi-class anomaly detection** including the `AMBIGUOUS` class
- **Synthetic-vs-real transfer-learning** studies
- **Feature engineering** practice with CICFlowMeter-compatible fields
## Loading the Data
```python
import pandas as pd
flows = pd.read_csv("network_flows.csv")
sessions = pd.read_csv("session_summary.csv")
topology = pd.read_csv("network_topology.csv")
events = pd.read_csv("flow_events.csv")
# Join flows to topology to get defender configuration
flows_enriched = flows.merge(topology, on="segment_id", how="left")
# Binary classification target
y = (flows["label"] == "MALICIOUS").astype(int)
```
For a worked end-to-end example including the 3-class classification target,
feature engineering, and predictions, see the inference notebook in the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb001-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB001 dataset includes **~685,000 rows** across all four files,
with calibrated A-grade benchmark validation across 12 statistical tests.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb001_sample_2026,
title = {CYB001: Synthetic Network Traffic Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb001-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 13:23:38 UTC
- Simulation window : 30 days
- Overall benchmark : 100.0 / 100 (grade A+)
|