cyb001-sample / README.md
pradeep-xpert's picture
Add link to trained baseline classifier
df49526 verified
---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- network-traffic
- intrusion-detection
- synthetic-data
- anomaly-detection
- apt
- c2-beacon
pretty_name: CYB001 Synthetic Network Traffic (Sample)
size_categories:
- 1K<n<10K
---
# CYB001 — Synthetic Network Traffic Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB001-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB001 — Synthetic Network Traffic
Dataset** product. It contains roughly **1 / 60th of the full dataset** at
identical schema, label distribution, and statistical fingerprint, so you can
evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb001-baseline-classifier**](https://huggingface.co/xpertsystems/cyb001-baseline-classifier)
> — XGBoost + PyTorch MLP, copy-paste inference notebook, full metrics and
> honest limitations in the model card.
| File | Rows (sample) | Rows (full) | Description |
|-------------------------|---------------|---------------|--------------------------------------------|
| `network_topology.csv` | ~200 | ~3,200 | Network segments and defender configs |
| `session_summary.csv` | ~1000 | ~62,000 | Multi-flow session aggregates |
| `network_flows.csv` | ~9,770 | ~500,000 | Per-flow records (CICFlowMeter-compatible) |
| `flow_events.csv` | ~5,431 | ~120,000 | Per-flow security event records |
## Dataset Summary
CYB001 simulates 30 days of enterprise network traffic across **9 segment
types** (corporate LAN, DMZ, cloud workload, OT/ICS, endpoint fleet, SOC
management plane, zero-trust, guest Wi-Fi, data centre spine), with:
- **3-class labels**: `BENIGN`, `MALICIOUS`, `AMBIGUOUS`
- **19 fine-grained traffic categories** including portscan, brute-force,
SQLi, XSS, exfiltration, C2 beaconing, lateral movement, ransomware staging
- **4 attacker capability tiers**: opportunistic, targeted, APT, insider threat
- **Diurnal traffic patterns** with off-peak attack bias for APT/insider tiers
- **APT C2 beacon regularity** governed by a configurable IAT coefficient of
variation (default 0.065 → regularity score ≈ 0.93)
All IP addresses are SHA-256 pseudonyms (`IP_<12 hex>`) — no real network data.
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb001-baseline-classifier](https://huggingface.co/xpertsystems/cyb001-baseline-classifier)**.
| Component | Detail |
|---|---|
| Task | 3-class flow classification (`BENIGN` / `MALICIOUS` / `AMBIGUOUS`) |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 101 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost test accuracy 0.998, macro-F1 0.996 — synthetic; see model card for limitations |
This is a reference baseline, not a production IDS. The model card documents
the calibrated signals it picks up, an ablation showing the model is not
session-dominated, and six explicit limitations including the gap between
synthetic and real-world traffic.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics; the sample preserves
the same calibration. Observed values on this sample:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| malicious_flow_rate | 0.1720 | 0.2015 | ✓ PASS |
| c2_beacon_regularity_score | 0.7800 | 0.7673 | ✓ PASS |
| payload_entropy_benign_mean | 4.8000 | 4.8556 | ✓ PASS |
| protocol_violation_rate | 0.0150 | 0.0161 | ✓ PASS |
| scan_probe_density | 0.0430 | 0.0450 | ✓ PASS |
| exfil_volume_ratio | 0.0240 | 0.0153 | ✓ PASS |
| retransmission_rate | 0.0380 | 0.0365 | ✓ PASS |
| dns_query_rate_anomaly | 0.0620 | 0.0620 | ✓ PASS |
| lateral_move_flag_rate | 0.0310 | 0.0340 | ✓ PASS |
| session_risk_score_apt | 0.6800 | 0.6803 | ✓ PASS |
| fwd_bwd_byte_ratio_benign | 1.3400 | 1.4119 | ✓ PASS |
| tunnel_detection_rate | 0.0180 | 0.0180 | ✓ PASS |
## Schema
### `network_flows.csv` (primary file)
| Column | Type | Description |
|------------------------------|---------|----------------------------------------------|
| flow_id | string | Unique flow identifier |
| session_id | string | Parent session FK |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| destination_ip_hash | string | SHA-256 pseudonymised destination IP |
| source_port, dest_port | int | TCP/UDP port numbers |
| protocol | string | TCP / UDP / HTTPS / DNS / SMTP / SSH / etc. |
| flow_start_timestamp | string | ISO timestamp |
| flow_duration_ms | int | Flow duration in milliseconds |
| total_fwd_packets | int | Forward packet count |
| total_bwd_packets | int | Backward packet count |
| total_bytes_fwd | int | Forward byte volume |
| total_bytes_bwd | int | Backward byte volume |
| fwd_packet_len_mean / _std | int | Forward packet length statistics |
| bwd_packet_len_mean / _std | int | Backward packet length statistics |
| flow_bytes_per_sec | float | Throughput (bytes/sec) |
| flow_packets_per_sec | float | Throughput (packets/sec) |
| inter_arrival_time_mean/_std | float | IAT statistics (ms) — key C2 beacon feature |
| tcp_flag_{syn,ack,fin,rst,psh,urg}_count | int | TCP flag counts |
| flow_lifecycle_phase | string | initiation / handshake / transfer / etc. |
| traffic_category | string | 1 of 19 fine-grained categories |
| attack_subcategory | string | Attack subcategory (empty for benign) |
| **label** | string | **BENIGN / MALICIOUS / AMBIGUOUS** (target) |
| segment_id | string | FK to `network_topology.csv` |
| source_device_type | string | workstation / server / iot / mobile / cloud |
| dest_device_type | string | (same as source) |
| attacker_capability_tier | string | opportunistic / targeted / apt / insider |
| retransmission_flag | int | TCP retransmission flag |
| fragmentation_flag | int | IP fragmentation flag |
| protocol_violation_flag | int | Protocol-violation detection flag |
See `session_summary.csv`, `network_topology.csv`, and `flow_events.csv` for
the complementary aggregate, topology, and per-event schemas.
## Suggested Use Cases
- Training and evaluating **network intrusion detection** models
- Benchmarking **C2 beacon detection** algorithms (regular-IAT signatures)
- **APT behaviour modelling** with off-peak temporal bias
- **Multi-class anomaly detection** including the `AMBIGUOUS` class
- **Synthetic-vs-real transfer-learning** studies
- **Feature engineering** practice with CICFlowMeter-compatible fields
## Loading the Data
```python
import pandas as pd
flows = pd.read_csv("network_flows.csv")
sessions = pd.read_csv("session_summary.csv")
topology = pd.read_csv("network_topology.csv")
events = pd.read_csv("flow_events.csv")
# Join flows to topology to get defender configuration
flows_enriched = flows.merge(topology, on="segment_id", how="left")
# Binary classification target
y = (flows["label"] == "MALICIOUS").astype(int)
```
For a worked end-to-end example including the 3-class classification target,
feature engineering, and predictions, see the inference notebook in the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb001-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB001 dataset includes **~685,000 rows** across all four files,
with calibrated A-grade benchmark validation across 12 statistical tests.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb001_sample_2026,
title = {CYB001: Synthetic Network Traffic Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb001-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 13:23:38 UTC
- Simulation window : 30 days
- Overall benchmark : 100.0 / 100 (grade A+)