File size: 14,341 Bytes
fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 1044ccd 7426505 fd6e991 7426505 fd6e991 1044ccd fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 1044ccd 7426505 fd6e991 7426505 fd6e991 1044ccd 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 1044ccd fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 fd6e991 7426505 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- identity-security
- account-takeover
- mfa-bypass
- ueba
- zero-trust
- apt
- synthetic-data
- lateral-movement
- golden-ticket
pretty_name: CYB006 — Synthetic Login Activity Dataset (Sample)
size_categories:
- 1K<n<10K
---
# CYB006 — Synthetic Login Activity Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB006-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB006 — Synthetic Login Activity
Dataset** product. It contains roughly **~1.3% of the full dataset** at
identical schema, threat-actor-tier distribution, and statistical fingerprint,
so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb006-baseline-classifier**](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)
> — XGBoost + PyTorch MLP for **3-class user-risk-tier classification**
> (insider-threat scoring use case), stratified split, multi-seed evaluation
> (ROC-AUC 0.812 ± 0.048). **Includes a structural-leakage diagnostic on
> the threat-actor detection task** that buyers planning ATO / threat-actor
> ML work should read first.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|----------------------------------------------|
| `identity_topology.csv` | ~150 | ~3,200 | Identity domain registry |
| `user_risk_summary.csv` | ~200 | ~6,500 | Per-user risk aggregates |
| `login_sessions.csv` | ~5,000 | ~377,000 | Per-session login records (primary file) |
| `auth_events.csv` | ~31,900 | ~750,000 | Discrete authentication event log |
## Dataset Summary
CYB006 simulates enterprise login activity as a **6-phase session state
machine** across diverse identity infrastructures, with:
- **4 threat-actor capability tiers**: script_kiddie, opportunistic,
advanced_persistent_threat (APT), nation_state — with per-tier credential
attack patterns, MFA bypass propensity, lateral hop distributions, and
Golden Ticket / Pass-the-Hash abuse rates
- **8 identity domain types**: on-premises AD, Azure AD, Okta, hybrid_joined,
SAML federated, zero_trust_ztna, PAW (privileged access workstation),
SaaS application portal — each with distinct detection_strength and
resilience scores
- **MFA challenge methods**: disabled, SMS, TOTP, push notification,
phishing-resistant FIDO2 — with per-method bypass propensity calibration
- **6 session lifecycle phases**: pre_auth_probe, credential_submission,
mfa_challenge, session_active, lateral_traversal, session_termination
- **Geo-velocity modeling** with impossible travel detection via Haversine
distance and per-user expected geolocation baselines
- **UEBA scoring** with calibrated false-positive rates
- **Conditional Access (CA) policy enforcement** modeling — ZTNA block
strength tunable per architecture
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb006-baseline-classifier](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)**.
| Component | Detail |
|---|---|
| Primary task | **3-class user_risk_tier classification** (insider-threat scoring) |
| Diagnostic | Audit of threat-actor detection on this sample (see `leakage_diagnostic.json`) |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 34 per-user features (aggregates + non-leaky session aggregates + engineered) |
| Split | **Stratified by user_risk_tier** — user-level task, n=200 |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.700 ± 0.082, macro ROC-AUC 0.812 ± 0.048 (multi-seed) |
**Important diagnostic finding for buyers planning threat-actor detection
work:** the model card documents that this sample's threat-actor-vs-legitimate
session populations have **non-overlapping anomaly score distributions**
across at least six feature groups (velocity, timestamp, credential attempt
count, login outcome, geo country, device trust). As a result, a plain
XGBoost achieves 100% test accuracy on threat-actor binary detection that
does not reflect real-world detection difficulty. The baseline model
targets `user_risk_tier` instead, which is a legitimate ML task on the
sample. See the model card's [Leakage diagnostic](https://huggingface.co/xpertsystems/cyb006-baseline-classifier#leakage-diagnostic)
section for the full audit and recommendations.
## Calibrated Benchmark Targets
The full product is calibrated to **12 benchmark validation tests** drawn
from authoritative identity security sources (Microsoft Digital Defense
Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories,
Mandiant M-Trends, MITRE ATT&CK Evaluations, Gartner IAM Hype Cycle,
KuppingerCole Leadership Compass).
**Benchmark categories** (calibrated in both sample and full product):
1. **Credential attack velocity** — brute force (~50 RPS), password spray (<1 RPS)
2. **Account takeover rate by tier** — graduated by attacker capability
3. **MFA bypass rate** — FIDO2 ≤1%, push/SMS variable
4. **Impossible travel rate** — 7-12% of sessions
5. **Lateral movement depth** — capped per tier (script_kiddie ≤1.2 → nation_state ≤14)
6. **Privilege escalation rate** — conditional on lateral movement
7. **MFA fatigue burst timing** — Poisson λ=7 burst pattern
8. **UEBA false positive rate** — calibrated to 10-14% range
9. **Golden Ticket / Pass-the-Hash detection gap** — stealth modeling
10. **Session duration anomaly separation** — KL divergence proxy
11. **Conditional Access block rate** — ZTNA ≥88% for untrusted
12. **Kill-chain completion rate** — phase-to-phase progression
Sample benchmark results:
| Test | Description | Verdict |
|------|-------------|---------|
| T01 | Credential Attack Velocity | ✓ PASS |
| T02 | Account Takeover Rate by Tier | ✓ PASS |
| T03 | MFA Bypass Rate (FIDO2) | ✓ PASS |
| T04 | Impossible Travel Rate | ✓ PASS |
| T05 | Lateral Movement Depth by Tier | ✓ PASS |
| T06 | Privilege Escalation Rate | ✓ PASS |
| T07 | MFA Fatigue Burst Detection | ✓ PASS |
| T08 | UEBA False Positive Rate | ✓ PASS |
| T09 | Golden Ticket / PtH Detection Gap | ✓ PASS |
| T10 | Session Duration Anomaly Separation | ✓ PASS |
| T11 | Conditional Access Block Rate (ZTNA) | ✓ PASS |
| T12 | Kill-Chain Completion Rate | ✓ PASS |
*Note: some benchmarks (e.g. nation-state account takeover rates, Golden
Ticket detection) require larger sample sizes to converge tightly because
they're conditional on small attacker-tier subsets (nation_state ≈ 2% of
all sessions, APT ≈ 3%). The full product demonstrates all 12 benchmarks
with strong statistical power.*
## Schema Highlights
### `login_sessions.csv` (primary file)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| session_id | string | Unique session identifier |
| user_id | string | User identifier (FK to user_risk_summary) |
| session_timestamp_utc | string | ISO timestamp |
| session_phase | string | 1 of 6 phases |
| login_outcome | string | success / failed / mfa_required / blocked |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| geo_country_code | string | ISO 3166 country code |
| geo_city_hash | string | Hashed city locator |
| device_id_hash | string | Hashed device fingerprint |
| device_trust_level | string | unknown / known / managed / compliant |
| authentication_method | string | password / sso / certificate / api_key |
| mfa_challenge_type | string | disabled / sms / totp / push / fido2 |
| mfa_response_latency_ms | int | MFA response latency |
| credential_attempt_count | int | Attempts before success |
| session_duration_seconds | int | Session length |
| target_application_id | string | Application accessed |
| privilege_level_accessed | string | standard / power_user / admin / domain_admin |
| user_risk_tier | string | low / medium / high / critical |
| threat_actor_capability_tier | string | script_kiddie / opportunistic / apt / nation_state (target) |
| geo_anomaly_score | float | Geographic anomaly score (0–1) |
| velocity_anomaly_score | float | Login velocity anomaly score (0–1) |
| impossible_travel_flag | int | Boolean — impossible travel detected |
### `user_risk_summary.csv` (per-user aggregates)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| user_id | string | User identifier |
| user_risk_tier | string | Risk tier classification target |
| total_login_attempts | int | Total login attempts in window |
| successful_logins | int | Successful logins |
| failed_logins | int | Failed logins |
| mfa_failures | int | MFA challenge failures |
| impossible_travel_events | int | Count of impossible travel detections |
| lateral_hop_count | int | Total lateral movement hops |
| privilege_escalations | int | Privilege escalation count |
| account_lockout_count | int | Account lockout events |
| geo_dispersion_score | float | Geographic dispersion (0–1) |
| login_velocity_score | float | Velocity anomaly (0–1) |
| session_anomaly_rate | float | Fraction of anomalous sessions |
| ueba_alert_count | int | UEBA alerts raised |
| threat_actor_flag | int | Boolean — threat actor |
| account_takeover_flag | int | Boolean — account takeover detected |
| overall_identity_risk_score | float | Composite identity risk (0–1) |
| insider_threat_indicator_score | float | Insider threat composite (0–1) |
See `auth_events.csv` and `identity_topology.csv` for the event log and
identity domain schemas respectively.
## Suggested Use Cases
- Training **insider threat scoring** models —
[worked example available](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)
- **Account takeover (ATO) detection** model development (see leakage diagnostic in the baseline model card before training)
- **Threat-actor tier classification** — 4-class with realistic class imbalance (see leakage diagnostic before training)
- **Impossible travel detection** — geo-velocity feature engineering
- **MFA bypass detection** — distinguish FIDO2 anomalies from push fatigue
- **Lateral movement detection** — session-graph traversal patterns
- **Golden Ticket / Pass-the-Hash** detection benchmarking
- **UEBA precision/recall tuning** with calibrated false-positive baselines
- **Conditional Access policy effectiveness** simulation
- **Zero Trust posture validation** — ZTNA block rate analysis
## Loading the Data
```python
import pandas as pd
sessions = pd.read_csv("login_sessions.csv")
users = pd.read_csv("user_risk_summary.csv")
events = pd.read_csv("auth_events.csv")
domains = pd.read_csv("identity_topology.csv")
# Join session data with user-level risk labels
enriched = sessions.merge(users, on="user_id", how="left",
suffixes=("", "_user"))
# Threat-actor tier classification target (4-class) — see leakage diagnostic
y_tier = sessions["threat_actor_capability_tier"]
# Binary account-takeover detection target
y_ato = users["account_takeover_flag"]
# Binary impossible-travel target
y_it = sessions["impossible_travel_flag"]
```
For a worked end-to-end example with user-risk-tier classification,
stratified splitting, and feature engineering, see the inference notebook
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb006-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB006 dataset includes **~1.1 million rows** across all four files,
with 12 calibrated benchmark validation tests drawn from authoritative
identity security and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb006_sample_2026,
title = {CYB006: Synthetic Login Activity Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb006-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:13:20 UTC
- Session model : 6-phase login lifecycle state machine
- Benchmark tests : 12/12 passing
|