File size: 13,430 Bytes
6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 3ad06d2 6143441 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- soc-operations
- alert-triage
- mitre-attack
- soar
- siem
- synthetic-data
- incident-response
- analyst-fatigue
- false-positive-reduction
pretty_name: CYB008 — Synthetic SOC Alert Dataset (Sample)
size_categories:
- 10K<n<100K
---
# CYB008 — Synthetic SOC Alert Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB008-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB008 — Synthetic SOC Alert
Dataset** product. It contains roughly **~10% of the full dataset** at
identical schema, MITRE ATT&CK tactic coverage, and statistical fingerprint,
so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline available:**
> [**xpertsystems/cyb008-baseline-classifier**](https://huggingface.co/xpertsystems/cyb008-baseline-classifier)
> — XGBoost + PyTorch MLP for **5-class SOC alert triage outcome
> classification** (the README's first headline use case), stratified
> split, multi-seed evaluation (ROC-AUC 0.955 ± 0.003). **Includes a
> structural-leakage diagnostic** documenting three oracle columns
> dropped from the feature set, and a separate unlearnable-target
> finding for MITRE ATT&CK tactic classification. Buyers planning
> SOC ML work should read the diagnostic first.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|----------------------------------------------|
| `soc_topology.csv` | ~25 | ~2,400 | SOC / analyst registry |
| `incident_summary.csv` | ~589 | ~4,800 | Per-incident aggregate outcomes |
| `alert_events.csv` | ~55,298 | ~48,000 | Discrete alert event log |
| `soc_alerts.csv` | ~9,200 | ~280,000 | Per-alert records (primary file) |
## Dataset Summary
CYB008 simulates end-to-end Security Operations Centre (SOC) alert
lifecycles across enterprise detection environments, with:
- **Full MITRE ATT&CK tactic coverage** — alerts mapped to all 14
Enterprise tactics from reconnaissance through impact
- **Alert severity distribution** — info / low / medium / high / critical
/ false_positive, with calibrated 45% false-positive baseline
- **SOC analyst tier modeling** — tier_1 / tier_2 / tier_3 / SOC manager
with differentiated MTTR by experience level
- **SOAR automation** — playbook trigger probability, auto-resolution
rate, automation coverage by alert type
- **Alert storm events** — Poisson-distributed alert bursts (2.5×–6×
amplification) simulating coordinated attacks or system failures
- **Analyst fatigue modeling** — utilization-driven burnout with MTTR
degradation past fatigue threshold (0.82)
- **Kill-chain correlated incidents** — alerts grouped into multi-stage
incidents when ≥3 ATT&CK tactics observed
- **SLA tracking** — severity-dependent SLA thresholds (critical 60min,
high 240min, medium 480min, low 1440min)
- **Detection source mix** — EDR, SIEM, NDR, IDS, UEBA, CASB, deception,
threat intel feeds
- **Rule drift modeling** — periodic rule-noise amplification simulating
detection-engineering signal decay
## Trained Baseline Available
A working baseline classifier trained on this sample is published at
**[xpertsystems/cyb008-baseline-classifier](https://huggingface.co/xpertsystems/cyb008-baseline-classifier)**.
| Component | Detail |
|---|---|
| Primary task | **5-class `resolution_outcome` classification** (SOC alert triage — the README's first headline use case) |
| Diagnostic | Structural-leakage audit (3 oracle columns dropped) + unlearnable-target finding for `mitre_tactic` |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 53 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Stratified random** — no natural row-level group key (25 analysts, 5 SOCs, only 9% of alerts link to an incident) |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.777 ± 0.007, macro ROC-AUC 0.955 ± 0.003 (multi-seed); MLP slightly outperforms |
**Important findings for buyers planning SOC ML work:**
1. **Three structural oracles in the data** (`alert_lifecycle_phase`,
`automation_resolved`, `escalation_flag`) deterministically encode
the `resolution_outcome` label. With these columns present, a
plain XGBoost achieves 100% accuracy. The baseline excludes them
to demonstrate honest learning — and the documented honest result
(acc 0.78, AUC 0.96) is genuinely useful.
2. **MITRE ATT&CK tactic classification is NOT learnable on this
sample.** The README lists tactic classification as a top use case,
but feature distributions are nearly identical across all 12
tactics. A trained model performs *below* majority baseline
(acc 0.08 vs 0.14). The baseline model card documents this
explicitly with a recommendation to the dataset author.
3. **SLA breach prediction is also not learnable** (acc 0.68 vs
majority 0.82). Documented as out-of-scope.
See the model card and `leakage_diagnostic.json` for the full audit
and our recommendations to make these tasks viable in the next
dataset version.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from
authoritative SOC operations research (SANS SOC Survey, IBM Cost of Data
Breach, Mandiant M-Trends, Forrester Wave SOAR, Gartner SIEM Magic
Quadrant, SOC.OS, CrowdStrike, Splunk State of Security, Verizon DBIR).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| false_positive_rate | 0.4500 | 0.4518 | ✓ PASS |
| mttd_minutes_mean | 132.0 | 137.1 | ✓ PASS |
| mttr_minutes_mean | 480.0 | 494.9 | ✓ PASS |
| escalation_rate | 0.2200 | 0.2038 | ✓ PASS |
| auto_resolution_rate | 0.3100 | 0.2872 | ✓ PASS |
| alert_volume_rate | 0.1650 | 0.1840 | ✓ PASS |
| analyst_fatigue_score | 0.6400 | 0.6457 | ✓ PASS |
| soar_playbook_execution_rate | 0.4200 | 0.4223 | ✓ PASS |
| incident_declaration_rate | 0.0850 | 0.0640 | ✓ PASS |
| true_positive_rate | 0.3800 | 0.3442 | ✓ PASS |
| kill_chain_completion_rate | 0.1450 | 0.1290 | ✓ PASS |
| sla_breach_rate | 0.1800 | 0.1775 | ✓ PASS |
*Note: every CYB008 benchmark is directly parametrised by the generator
(e.g. `soar_trigger_prob=0.42` produces `soar_playbook_execution_rate=0.42`).
Calibration is precise even at sample scale. The full product produces the
same calibration across 28× more data.*
## Schema Highlights
### `soc_alerts.csv` (primary file)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| alert_id | string | Unique alert identifier |
| incident_id | string | Parent incident FK (nullable) |
| soc_id | string | SOC environment FK |
| analyst_id | string | Assigned analyst FK |
| alert_timestamp | string | ISO timestamp |
| alert_severity | string | info / low / medium / high / critical / false_positive |
| mitre_tactic | string | 1 of 14 ATT&CK tactics |
| mitre_technique_id | string | T-number (e.g. T1059.001) |
| detection_source | string | edr / siem / ndr / ids / ueba / casb / etc. |
| triage_score | float | Initial triage priority (0–1) |
| enrichment_score | float | Threat-intel enrichment quality (0–1) |
| escalation_flag | int | Boolean — escalated to tier 2/3 |
| automation_resolved | int | Boolean — SOAR auto-resolved |
| soar_playbook_triggered | int | Boolean — SOAR playbook executed |
| mttd_minutes | float | Mean time to detect |
| mttr_minutes | float | Mean time to respond |
| sla_breached_flag | int | Boolean — SLA breached |
| resolution_outcome | string | true_positive / false_positive / duplicate / suppressed |
| analyst_tier | string | tier_1 / tier_2 / tier_3 / manager |
| storm_event_flag | int | Boolean — part of alert storm |
| kill_chain_stage | int | Position in kill chain (0 if standalone) |
### `incident_summary.csv` (per-incident outcome)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| incident_id | string | Identifier |
| soc_id, analyst_id | string | Identifiers |
| n_alerts_correlated | int | Alerts grouped into this incident |
| kill_chain_stages_observed | int | Distinct ATT&CK tactics in chain |
| incident_severity | string | Composite severity |
| incident_resolution_outcome | string | true_positive / false_positive / partial |
| analyst_fatigue_score | float | Avg fatigue during incident (0–1) |
| incident_duration_minutes | float | End-to-end response time |
See `alert_events.csv` and `soc_topology.csv` for the discrete event log
and SOC registry schemas respectively.
## Suggested Use Cases
- Training **alert triage** models — predict TP vs FP, or full 5-class
resolution outcome (the baseline ships this) —
[worked example available](https://huggingface.co/xpertsystems/cyb008-baseline-classifier)
- **MITRE ATT&CK tactic classification** from alert features (see baseline diagnostic — not learnable on this sample)
- **SOAR playbook recommendation** — predict which alerts benefit from
automation
- **Alert prioritization** — calibrate triage scores against ground-truth
outcomes
- **Analyst fatigue forecasting** — predict burnout from shift-level
workload
- **Kill-chain detection** — group related alerts into multi-stage
incidents
- **SLA breach prediction** — early-warning systems (see baseline diagnostic — not learnable on this sample)
- **Alert storm detection** — distinguish coordinated bursts from baseline
volume
- **False positive reduction** modeling — reduce 45% FP rate
- **Detection rule tuning** — identify rules with high noise factor
## Loading the Data
```python
import pandas as pd
alerts = pd.read_csv("soc_alerts.csv")
incidents = pd.read_csv("incident_summary.csv")
events = pd.read_csv("alert_events.csv")
topology = pd.read_csv("soc_topology.csv")
# Join alerts with analyst context
enriched = alerts.merge(topology, on=["soc_id", "analyst_id"], how="left",
suffixes=("", "_analyst"))
# 5-class triage outcome target (the README's first headline use case)
y_outcome = alerts["resolution_outcome"]
# Binary true-positive collapse (for binary triage)
y_tp = alerts["resolution_outcome"].isin([
"true_positive_remediated", "true_positive_escalated",
]).astype(int)
# Multi-class ATT&CK tactic classification target — see leakage diagnostic
y_tactic = alerts["mitre_tactic"]
# Binary SLA breach prediction target — see leakage diagnostic
y_sla = alerts["sla_breached_flag"]
```
For a worked end-to-end example with 5-class triage classification,
stratified splitting, and feature engineering, see the inference notebook
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb008-baseline-classifier/blob/main/inference_example.ipynb).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB008 dataset includes **~335,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative SOC operations and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb008_sample_2026,
title = {CYB008: Synthetic SOC Alert Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb008-sample}
}
```
## Generation Details
- Generator version : 1.2.0
- Random seed : 42
- Generated : 2026-05-16 14:24:43 UTC
- Alert lifecycle : Multi-phase state machine with SOAR / fatigue / storm
- Overall benchmark : 100.0 / 100 (grade A+)
|