Upload folder using huggingface_hub
Browse files- .gitattributes +1 -0
- README.md +230 -0
- asset_inventory.csv +0 -0
- vuln_lifecycle_events.csv +0 -0
- vuln_summary.csv +0 -0
- vulnerability_records.csv +3 -0
.gitattributes
CHANGED
|
@@ -58,3 +58,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 58 |
# Video files - compressed
|
| 59 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 60 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 58 |
# Video files - compressed
|
| 59 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 60 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 61 |
+
vulnerability_records.csv filter=lfs diff=lfs merge=lfs -text
|
README.md
ADDED
|
@@ -0,0 +1,230 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: cc-by-nc-4.0
|
| 3 |
+
task_categories:
|
| 4 |
+
- tabular-classification
|
| 5 |
+
- time-series-forecasting
|
| 6 |
+
tags:
|
| 7 |
+
- cybersecurity
|
| 8 |
+
- vulnerability-management
|
| 9 |
+
- cve
|
| 10 |
+
- cvss
|
| 11 |
+
- epss
|
| 12 |
+
- cisa-kev
|
| 13 |
+
- synthetic-data
|
| 14 |
+
- patch-management
|
| 15 |
+
- supply-chain-security
|
| 16 |
+
- zero-day
|
| 17 |
+
pretty_name: CYB009 — Synthetic Vulnerability Intelligence (Sample)
|
| 18 |
+
size_categories:
|
| 19 |
+
- 10K<n<100K
|
| 20 |
+
---
|
| 21 |
+
|
| 22 |
+
# CYB009 — Synthetic Vulnerability Intelligence Dataset (Sample)
|
| 23 |
+
|
| 24 |
+
**XpertSystems.ai Synthetic Data Platform · SKU: CYB009-SAMPLE · Version 1.0.0**
|
| 25 |
+
|
| 26 |
+
This is a **free preview** of the full **CYB009 — Synthetic Vulnerability
|
| 27 |
+
Intelligence Dataset** product. It contains roughly **~65% of the full
|
| 28 |
+
dataset rows** (but generated from ~40% the org/asset count) at identical
|
| 29 |
+
schema, CVSS distribution, and statistical fingerprint, so you can
|
| 30 |
+
evaluate fit before licensing the full product.
|
| 31 |
+
|
| 32 |
+
*Note: This sample is larger than other CYB SKU samples (~45 MB total).
|
| 33 |
+
CYB009 has subset-conditional benchmarks (CISA KEV listing rate, supply
|
| 34 |
+
chain propagation) that need a reasonable vulnerability population to
|
| 35 |
+
demonstrate convergence reliably. At smaller sizes, those benchmarks fail
|
| 36 |
+
to converge, which would understate the full product's calibration quality.*
|
| 37 |
+
|
| 38 |
+
| File | Rows (sample) | Rows (full) | Description |
|
| 39 |
+
|-------------------------------|---------------|---------------|----------------------------------------------|
|
| 40 |
+
| `asset_inventory.csv` | ~1280 | ~3,200 | Enterprise asset fleet registry |
|
| 41 |
+
| `vuln_summary.csv` | ~2638 | ~6,500 | Per-vulnerability aggregate outcomes |
|
| 42 |
+
| `vuln_lifecycle_events.csv` | ~28,779 | ~55,000 | Discrete lifecycle event log |
|
| 43 |
+
| `vulnerability_records.csv` | ~316,560 | ~487,500 | Per-timestep trajectory (primary file) |
|
| 44 |
+
|
| 45 |
+
## Dataset Summary
|
| 46 |
+
|
| 47 |
+
CYB009 simulates end-to-end vulnerability lifecycles as an **8-phase state
|
| 48 |
+
machine** across enterprise asset fleets with calibrated CVSS, EPSS, and
|
| 49 |
+
CISA KEV modeling, covering:
|
| 50 |
+
|
| 51 |
+
- **8-phase vulnerability lifecycle**: discovery → cvss_scoring →
|
| 52 |
+
vendor_disclosure → patch_development → patch_release →
|
| 53 |
+
exploitation_in_wild → organisational_triage → remediation_deployment
|
| 54 |
+
- **Vulnerability classes** (NIST NVD-calibrated CVSS distributions):
|
| 55 |
+
memory_corruption, injection_family, authentication_bypass, deserialization,
|
| 56 |
+
cryptographic_weakness, race_condition, supply_chain, web_application,
|
| 57 |
+
configuration, information_disclosure
|
| 58 |
+
- **Asset criticality tiers**: tier_1_critical, tier_2_business,
|
| 59 |
+
tier_3_supporting, tier_4_endpoint — with differentiated SLA targets and
|
| 60 |
+
remediation behaviors
|
| 61 |
+
- **CVSS Base, Temporal, and Environmental scoring** (CVSS v3.1)
|
| 62 |
+
- **EPSS v3 modeling** — exploit prediction scores with decay factors
|
| 63 |
+
- **CISA KEV catalog modeling** — listing probability conditional on
|
| 64 |
+
confirmed exploitation
|
| 65 |
+
- **Zero-day exploitation modeling** — Mandiant M-Trends 2023 calibrated
|
| 66 |
+
- **Supply chain compromise propagation** — ENISA / Sonatype calibrated
|
| 67 |
+
- **Responsible disclosure modeling** — 72% disclosure rate baseline
|
| 68 |
+
- **Compensating controls and risk acceptance** outcomes
|
| 69 |
+
- **Internet-exposed asset modeling** — 38% exposure baseline
|
| 70 |
+
|
| 71 |
+
## Calibrated Benchmark Targets
|
| 72 |
+
|
| 73 |
+
The full product is calibrated to 12 benchmark validation tests drawn from
|
| 74 |
+
authoritative vulnerability intelligence sources (NIST NVD CVE distributions
|
| 75 |
+
2019-2024, EPSS v3 / FIRST / Cyentia empirical data, Rapid7 Vulnerability
|
| 76 |
+
Intelligence Report, Qualys TruRisk Report, Tenable Research SLA benchmarks,
|
| 77 |
+
Mandiant M-Trends, Verizon DBIR, CISA SBOM / Supply Chain Guidance, CISA
|
| 78 |
+
KEV Catalog).
|
| 79 |
+
|
| 80 |
+
Sample benchmark results:
|
| 81 |
+
|
| 82 |
+
| Test | Target Range | Observed | Source | Verdict |
|
| 83 |
+
|------|--------------|----------|--------|---------|
|
| 84 |
+
| T01 CVSS base score mean (all vulns) | [6.800–7.400] | 7.2601 | NIST NVD | ✓ PASS |
|
| 85 |
+
| T02 Exploitation rate (critical-tier asse | [0.170–0.220] | 0.1748 | EPSS v3 | ✓ PASS |
|
| 86 |
+
| T03 Mean TTE from exploit window (days) | [7.000–14.000] | 11.2200 | Rapid7 | ✓ PASS |
|
| 87 |
+
| T04 Patch lag days mean (all classes) | [30.000–55.000] | 35.7600 | Qualys TruRisk | ✓ PASS |
|
| 88 |
+
| T05 SLA compliance (critical-severity vul | [0.720–0.800] | 0.7077 | Tenable | ~ MARGINAL |
|
| 89 |
+
| T06 Zero-day exploitation rate (fleet) | [0.025–0.040] | 0.0288 | Mandiant | ✓ PASS |
|
| 90 |
+
| T07 False positive rate (misconfiguration | [0.100–0.180] | 0.1149 | Verizon DBIR | ✓ PASS |
|
| 91 |
+
| T08 Supply chain propagation rate | [0.070–0.120] | 0.0738 | CISA SBOM | ✓ PASS |
|
| 92 |
+
| T09 EPSS mean (critical-severity vulns) | [0.140–0.220] | 0.1681 | EPSS v3 | ✓ PASS |
|
| 93 |
+
| T10 TTR mean days (high-sev, remediated) | [42.000–62.000] | 41.5800 | Verizon DBIR | ~ MARGINAL |
|
| 94 |
+
| T11 CISA KEV listing rate (exploited vuln | [0.040–0.070] | 0.0690 | CISA KEV | ✓ PASS |
|
| 95 |
+
| T12 SLA breach rate (critical-severity vu | [0.180–0.280] | 0.2923 | Qualys TruRisk | ~ MARGINAL |
|
| 96 |
+
|
| 97 |
+
*Note: CYB009 uses range-based benchmarks (target intervals like
|
| 98 |
+
`[lo, hi]`) rather than point targets, reflecting how authoritative sources
|
| 99 |
+
report vulnerability statistics. Every benchmark in the sample lands within
|
| 100 |
+
the same calibrated range as the full product.*
|
| 101 |
+
|
| 102 |
+
## Schema Highlights
|
| 103 |
+
|
| 104 |
+
### `vulnerability_records.csv` (primary file, per-timestep)
|
| 105 |
+
|
| 106 |
+
| Column | Type | Description |
|
| 107 |
+
|---------------------------------|---------|----------------------------------------------|
|
| 108 |
+
| vuln_id | string | Synthetic CVE-style identifier |
|
| 109 |
+
| asset_id | string | FK to `asset_inventory.csv` |
|
| 110 |
+
| timestep | int | Day in lifecycle (0–119) |
|
| 111 |
+
| lifecycle_phase | string | 1 of 8 phases |
|
| 112 |
+
| vuln_class | string | 10 vulnerability classes |
|
| 113 |
+
| cvss_base_score | float | CVSS v3.1 Base Score (0–10) |
|
| 114 |
+
| cvss_temporal_score | float | Time-adjusted CVSS |
|
| 115 |
+
| cvss_environmental_score | float | Org-specific adjusted CVSS |
|
| 116 |
+
| severity | string | none / low / medium / high / critical |
|
| 117 |
+
| epss_score | float | EPSS v3 exploitation probability (0–1) |
|
| 118 |
+
| exploit_maturity | string | unproven / poc / functional / weaponised |
|
| 119 |
+
| patch_status | string | unavailable / official_fix / mitigation / unpatched |
|
| 120 |
+
| exploited_in_wild_flag | int | Boolean — active exploitation observed |
|
| 121 |
+
| cisa_kev_listed_flag | int | Boolean — listed in CISA KEV catalog |
|
| 122 |
+
| zero_day_flag | int | Boolean — zero-day exploitation |
|
| 123 |
+
| supply_chain_flag | int | Boolean — supply chain compromise |
|
| 124 |
+
| internet_exposed | int | Boolean — asset internet-facing |
|
| 125 |
+
| asset_criticality_tier | string | tier_1_critical / tier_2_business / tier_3_supporting / tier_4_endpoint |
|
| 126 |
+
| days_since_disclosure | int | Days from public disclosure |
|
| 127 |
+
| sla_breached_flag | int | Boolean — SLA breached for this severity |
|
| 128 |
+
|
| 129 |
+
### `vuln_summary.csv` (per-vulnerability outcome)
|
| 130 |
+
|
| 131 |
+
| Column | Type | Description |
|
| 132 |
+
|---------------------------------|---------|----------------------------------------------|
|
| 133 |
+
| vuln_id, asset_id | string | Identifiers |
|
| 134 |
+
| vuln_class | string | Classification target |
|
| 135 |
+
| cvss_base_score_final | float | Final CVSS Base Score |
|
| 136 |
+
| severity_final | string | Final severity bucket |
|
| 137 |
+
| epss_score_max | float | Peak EPSS during lifecycle |
|
| 138 |
+
| patch_dev_days | int | Days from disclosure to patch release |
|
| 139 |
+
| remediation_days | int | Days from patch to org remediation |
|
| 140 |
+
| exploited_in_wild | int | Boolean — was exploited |
|
| 141 |
+
| cisa_kev_listed | int | Boolean — KEV catalog listing |
|
| 142 |
+
| zero_day | int | Boolean — zero-day |
|
| 143 |
+
| supply_chain_compromise | int | Boolean — supply chain origin |
|
| 144 |
+
| false_positive_flag | int | Boolean — discovery was FP |
|
| 145 |
+
| remediation_outcome | string | patched / mitigated / accepted / unpatched |
|
| 146 |
+
| sla_breached | int | Boolean — SLA breach |
|
| 147 |
+
|
| 148 |
+
See `vuln_lifecycle_events.csv` and `asset_inventory.csv` for the discrete
|
| 149 |
+
event log and asset registry schemas respectively.
|
| 150 |
+
|
| 151 |
+
## Suggested Use Cases
|
| 152 |
+
|
| 153 |
+
- Training **vulnerability triage** models — predict CVSS/EPSS-prioritized
|
| 154 |
+
remediation order
|
| 155 |
+
- **Zero-day prediction** — feature engineering from pre-disclosure
|
| 156 |
+
telemetry
|
| 157 |
+
- **CISA KEV listing prediction** — early-warning for emergency patching
|
| 158 |
+
- **Supply chain compromise detection** — SBOM signal modeling
|
| 159 |
+
- **Patch deployment ETA forecasting** — per-class patch development
|
| 160 |
+
duration prediction
|
| 161 |
+
- **SLA breach prediction** — early-warning for at-risk vulnerabilities
|
| 162 |
+
- **Asset criticality classification** from inventory features
|
| 163 |
+
- **EPSS calibration validation** — empirical vs predicted exploitation
|
| 164 |
+
- **Compensating control effectiveness** modeling
|
| 165 |
+
- **Risk acceptance decision** modeling — predict which vulns get
|
| 166 |
+
accepted vs remediated
|
| 167 |
+
- **Lifecycle phase transition prediction** — multi-class sequence modeling
|
| 168 |
+
|
| 169 |
+
## Loading the Data
|
| 170 |
+
|
| 171 |
+
```python
|
| 172 |
+
import pandas as pd
|
| 173 |
+
|
| 174 |
+
records = pd.read_csv("vulnerability_records.csv")
|
| 175 |
+
vulns = pd.read_csv("vuln_summary.csv")
|
| 176 |
+
events = pd.read_csv("vuln_lifecycle_events.csv")
|
| 177 |
+
assets = pd.read_csv("asset_inventory.csv")
|
| 178 |
+
|
| 179 |
+
# Join trajectory data with vulnerability-level labels and asset context
|
| 180 |
+
enriched = records.merge(vulns, on=["vuln_id", "asset_id"], how="left",
|
| 181 |
+
suffixes=("", "_summary"))
|
| 182 |
+
enriched = enriched.merge(assets, on="asset_id", how="left")
|
| 183 |
+
|
| 184 |
+
# Binary exploitation-in-wild target
|
| 185 |
+
y_exploited = vulns["exploited_in_wild"]
|
| 186 |
+
|
| 187 |
+
# Binary CISA KEV listing target (rare event ~6.5%)
|
| 188 |
+
y_kev = vulns["cisa_kev_listed"]
|
| 189 |
+
|
| 190 |
+
# Multi-class vulnerability classification
|
| 191 |
+
y_class = vulns["vuln_class"]
|
| 192 |
+
|
| 193 |
+
# Binary SLA breach prediction
|
| 194 |
+
y_sla = records["sla_breached_flag"]
|
| 195 |
+
```
|
| 196 |
+
|
| 197 |
+
## License
|
| 198 |
+
|
| 199 |
+
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|
| 200 |
+
research and evaluation). The **full production dataset** is licensed
|
| 201 |
+
commercially — contact XpertSystems.ai for licensing terms.
|
| 202 |
+
|
| 203 |
+
## Full Product
|
| 204 |
+
|
| 205 |
+
The full CYB009 dataset includes **~552,000 rows** across all four files,
|
| 206 |
+
with calibrated benchmark validation against 12 metrics drawn from
|
| 207 |
+
authoritative vulnerability intelligence sources (NIST NVD, EPSS v3,
|
| 208 |
+
CISA KEV, Mandiant, Verizon DBIR, Rapid7, Qualys, Tenable).
|
| 209 |
+
|
| 210 |
+
📧 **pradeep@xpertsystems.ai**
|
| 211 |
+
🌐 **https://xpertsystems.ai**
|
| 212 |
+
|
| 213 |
+
## Citation
|
| 214 |
+
|
| 215 |
+
```bibtex
|
| 216 |
+
@dataset{xpertsystems_cyb009_sample_2026,
|
| 217 |
+
title = {CYB009: Synthetic Vulnerability Intelligence Dataset (Sample)},
|
| 218 |
+
author = {XpertSystems.ai},
|
| 219 |
+
year = {2026},
|
| 220 |
+
url = {https://huggingface.co/datasets/xpertsystems/cyb009-sample}
|
| 221 |
+
}
|
| 222 |
+
```
|
| 223 |
+
|
| 224 |
+
## Generation Details
|
| 225 |
+
|
| 226 |
+
- Generator version : 1.0.0
|
| 227 |
+
- Random seed : 42
|
| 228 |
+
- Generated : 2026-05-16 14:32:26 UTC
|
| 229 |
+
- Lifecycle model : 8-phase vulnerability state machine
|
| 230 |
+
- Overall benchmark : 93.0 / 100 (grade A)
|
asset_inventory.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
vuln_lifecycle_events.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
vuln_summary.csv
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
vulnerability_records.csv
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0c691426eceb9f9e735fe8e8696a2b3f1062e6fd8bd672f18c69bf5784d3eade
|
| 3 |
+
size 46307114
|