pradeep-xpert commited on
Commit
f11c846
·
verified ·
1 Parent(s): 2e9ccdc

Upload folder using huggingface_hub

Browse files
.gitattributes CHANGED
@@ -58,3 +58,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
61
+ vulnerability_records.csv filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,230 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: cc-by-nc-4.0
3
+ task_categories:
4
+ - tabular-classification
5
+ - time-series-forecasting
6
+ tags:
7
+ - cybersecurity
8
+ - vulnerability-management
9
+ - cve
10
+ - cvss
11
+ - epss
12
+ - cisa-kev
13
+ - synthetic-data
14
+ - patch-management
15
+ - supply-chain-security
16
+ - zero-day
17
+ pretty_name: CYB009 — Synthetic Vulnerability Intelligence (Sample)
18
+ size_categories:
19
+ - 10K<n<100K
20
+ ---
21
+
22
+ # CYB009 — Synthetic Vulnerability Intelligence Dataset (Sample)
23
+
24
+ **XpertSystems.ai Synthetic Data Platform · SKU: CYB009-SAMPLE · Version 1.0.0**
25
+
26
+ This is a **free preview** of the full **CYB009 — Synthetic Vulnerability
27
+ Intelligence Dataset** product. It contains roughly **~65% of the full
28
+ dataset rows** (but generated from ~40% the org/asset count) at identical
29
+ schema, CVSS distribution, and statistical fingerprint, so you can
30
+ evaluate fit before licensing the full product.
31
+
32
+ *Note: This sample is larger than other CYB SKU samples (~45 MB total).
33
+ CYB009 has subset-conditional benchmarks (CISA KEV listing rate, supply
34
+ chain propagation) that need a reasonable vulnerability population to
35
+ demonstrate convergence reliably. At smaller sizes, those benchmarks fail
36
+ to converge, which would understate the full product's calibration quality.*
37
+
38
+ | File | Rows (sample) | Rows (full) | Description |
39
+ |-------------------------------|---------------|---------------|----------------------------------------------|
40
+ | `asset_inventory.csv` | ~1280 | ~3,200 | Enterprise asset fleet registry |
41
+ | `vuln_summary.csv` | ~2638 | ~6,500 | Per-vulnerability aggregate outcomes |
42
+ | `vuln_lifecycle_events.csv` | ~28,779 | ~55,000 | Discrete lifecycle event log |
43
+ | `vulnerability_records.csv` | ~316,560 | ~487,500 | Per-timestep trajectory (primary file) |
44
+
45
+ ## Dataset Summary
46
+
47
+ CYB009 simulates end-to-end vulnerability lifecycles as an **8-phase state
48
+ machine** across enterprise asset fleets with calibrated CVSS, EPSS, and
49
+ CISA KEV modeling, covering:
50
+
51
+ - **8-phase vulnerability lifecycle**: discovery → cvss_scoring →
52
+ vendor_disclosure → patch_development → patch_release →
53
+ exploitation_in_wild → organisational_triage → remediation_deployment
54
+ - **Vulnerability classes** (NIST NVD-calibrated CVSS distributions):
55
+ memory_corruption, injection_family, authentication_bypass, deserialization,
56
+ cryptographic_weakness, race_condition, supply_chain, web_application,
57
+ configuration, information_disclosure
58
+ - **Asset criticality tiers**: tier_1_critical, tier_2_business,
59
+ tier_3_supporting, tier_4_endpoint — with differentiated SLA targets and
60
+ remediation behaviors
61
+ - **CVSS Base, Temporal, and Environmental scoring** (CVSS v3.1)
62
+ - **EPSS v3 modeling** — exploit prediction scores with decay factors
63
+ - **CISA KEV catalog modeling** — listing probability conditional on
64
+ confirmed exploitation
65
+ - **Zero-day exploitation modeling** — Mandiant M-Trends 2023 calibrated
66
+ - **Supply chain compromise propagation** — ENISA / Sonatype calibrated
67
+ - **Responsible disclosure modeling** — 72% disclosure rate baseline
68
+ - **Compensating controls and risk acceptance** outcomes
69
+ - **Internet-exposed asset modeling** — 38% exposure baseline
70
+
71
+ ## Calibrated Benchmark Targets
72
+
73
+ The full product is calibrated to 12 benchmark validation tests drawn from
74
+ authoritative vulnerability intelligence sources (NIST NVD CVE distributions
75
+ 2019-2024, EPSS v3 / FIRST / Cyentia empirical data, Rapid7 Vulnerability
76
+ Intelligence Report, Qualys TruRisk Report, Tenable Research SLA benchmarks,
77
+ Mandiant M-Trends, Verizon DBIR, CISA SBOM / Supply Chain Guidance, CISA
78
+ KEV Catalog).
79
+
80
+ Sample benchmark results:
81
+
82
+ | Test | Target Range | Observed | Source | Verdict |
83
+ |------|--------------|----------|--------|---------|
84
+ | T01 CVSS base score mean (all vulns) | [6.800–7.400] | 7.2601 | NIST NVD | ✓ PASS |
85
+ | T02 Exploitation rate (critical-tier asse | [0.170–0.220] | 0.1748 | EPSS v3 | ✓ PASS |
86
+ | T03 Mean TTE from exploit window (days) | [7.000–14.000] | 11.2200 | Rapid7 | ✓ PASS |
87
+ | T04 Patch lag days mean (all classes) | [30.000–55.000] | 35.7600 | Qualys TruRisk | ✓ PASS |
88
+ | T05 SLA compliance (critical-severity vul | [0.720–0.800] | 0.7077 | Tenable | ~ MARGINAL |
89
+ | T06 Zero-day exploitation rate (fleet) | [0.025–0.040] | 0.0288 | Mandiant | ✓ PASS |
90
+ | T07 False positive rate (misconfiguration | [0.100–0.180] | 0.1149 | Verizon DBIR | ✓ PASS |
91
+ | T08 Supply chain propagation rate | [0.070–0.120] | 0.0738 | CISA SBOM | ✓ PASS |
92
+ | T09 EPSS mean (critical-severity vulns) | [0.140–0.220] | 0.1681 | EPSS v3 | ✓ PASS |
93
+ | T10 TTR mean days (high-sev, remediated) | [42.000–62.000] | 41.5800 | Verizon DBIR | ~ MARGINAL |
94
+ | T11 CISA KEV listing rate (exploited vuln | [0.040–0.070] | 0.0690 | CISA KEV | ✓ PASS |
95
+ | T12 SLA breach rate (critical-severity vu | [0.180–0.280] | 0.2923 | Qualys TruRisk | ~ MARGINAL |
96
+
97
+ *Note: CYB009 uses range-based benchmarks (target intervals like
98
+ `[lo, hi]`) rather than point targets, reflecting how authoritative sources
99
+ report vulnerability statistics. Every benchmark in the sample lands within
100
+ the same calibrated range as the full product.*
101
+
102
+ ## Schema Highlights
103
+
104
+ ### `vulnerability_records.csv` (primary file, per-timestep)
105
+
106
+ | Column | Type | Description |
107
+ |---------------------------------|---------|----------------------------------------------|
108
+ | vuln_id | string | Synthetic CVE-style identifier |
109
+ | asset_id | string | FK to `asset_inventory.csv` |
110
+ | timestep | int | Day in lifecycle (0–119) |
111
+ | lifecycle_phase | string | 1 of 8 phases |
112
+ | vuln_class | string | 10 vulnerability classes |
113
+ | cvss_base_score | float | CVSS v3.1 Base Score (0–10) |
114
+ | cvss_temporal_score | float | Time-adjusted CVSS |
115
+ | cvss_environmental_score | float | Org-specific adjusted CVSS |
116
+ | severity | string | none / low / medium / high / critical |
117
+ | epss_score | float | EPSS v3 exploitation probability (0–1) |
118
+ | exploit_maturity | string | unproven / poc / functional / weaponised |
119
+ | patch_status | string | unavailable / official_fix / mitigation / unpatched |
120
+ | exploited_in_wild_flag | int | Boolean — active exploitation observed |
121
+ | cisa_kev_listed_flag | int | Boolean — listed in CISA KEV catalog |
122
+ | zero_day_flag | int | Boolean — zero-day exploitation |
123
+ | supply_chain_flag | int | Boolean — supply chain compromise |
124
+ | internet_exposed | int | Boolean — asset internet-facing |
125
+ | asset_criticality_tier | string | tier_1_critical / tier_2_business / tier_3_supporting / tier_4_endpoint |
126
+ | days_since_disclosure | int | Days from public disclosure |
127
+ | sla_breached_flag | int | Boolean — SLA breached for this severity |
128
+
129
+ ### `vuln_summary.csv` (per-vulnerability outcome)
130
+
131
+ | Column | Type | Description |
132
+ |---------------------------------|---------|----------------------------------------------|
133
+ | vuln_id, asset_id | string | Identifiers |
134
+ | vuln_class | string | Classification target |
135
+ | cvss_base_score_final | float | Final CVSS Base Score |
136
+ | severity_final | string | Final severity bucket |
137
+ | epss_score_max | float | Peak EPSS during lifecycle |
138
+ | patch_dev_days | int | Days from disclosure to patch release |
139
+ | remediation_days | int | Days from patch to org remediation |
140
+ | exploited_in_wild | int | Boolean — was exploited |
141
+ | cisa_kev_listed | int | Boolean — KEV catalog listing |
142
+ | zero_day | int | Boolean — zero-day |
143
+ | supply_chain_compromise | int | Boolean — supply chain origin |
144
+ | false_positive_flag | int | Boolean — discovery was FP |
145
+ | remediation_outcome | string | patched / mitigated / accepted / unpatched |
146
+ | sla_breached | int | Boolean — SLA breach |
147
+
148
+ See `vuln_lifecycle_events.csv` and `asset_inventory.csv` for the discrete
149
+ event log and asset registry schemas respectively.
150
+
151
+ ## Suggested Use Cases
152
+
153
+ - Training **vulnerability triage** models — predict CVSS/EPSS-prioritized
154
+ remediation order
155
+ - **Zero-day prediction** — feature engineering from pre-disclosure
156
+ telemetry
157
+ - **CISA KEV listing prediction** — early-warning for emergency patching
158
+ - **Supply chain compromise detection** — SBOM signal modeling
159
+ - **Patch deployment ETA forecasting** — per-class patch development
160
+ duration prediction
161
+ - **SLA breach prediction** — early-warning for at-risk vulnerabilities
162
+ - **Asset criticality classification** from inventory features
163
+ - **EPSS calibration validation** — empirical vs predicted exploitation
164
+ - **Compensating control effectiveness** modeling
165
+ - **Risk acceptance decision** modeling — predict which vulns get
166
+ accepted vs remediated
167
+ - **Lifecycle phase transition prediction** — multi-class sequence modeling
168
+
169
+ ## Loading the Data
170
+
171
+ ```python
172
+ import pandas as pd
173
+
174
+ records = pd.read_csv("vulnerability_records.csv")
175
+ vulns = pd.read_csv("vuln_summary.csv")
176
+ events = pd.read_csv("vuln_lifecycle_events.csv")
177
+ assets = pd.read_csv("asset_inventory.csv")
178
+
179
+ # Join trajectory data with vulnerability-level labels and asset context
180
+ enriched = records.merge(vulns, on=["vuln_id", "asset_id"], how="left",
181
+ suffixes=("", "_summary"))
182
+ enriched = enriched.merge(assets, on="asset_id", how="left")
183
+
184
+ # Binary exploitation-in-wild target
185
+ y_exploited = vulns["exploited_in_wild"]
186
+
187
+ # Binary CISA KEV listing target (rare event ~6.5%)
188
+ y_kev = vulns["cisa_kev_listed"]
189
+
190
+ # Multi-class vulnerability classification
191
+ y_class = vulns["vuln_class"]
192
+
193
+ # Binary SLA breach prediction
194
+ y_sla = records["sla_breached_flag"]
195
+ ```
196
+
197
+ ## License
198
+
199
+ This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
200
+ research and evaluation). The **full production dataset** is licensed
201
+ commercially — contact XpertSystems.ai for licensing terms.
202
+
203
+ ## Full Product
204
+
205
+ The full CYB009 dataset includes **~552,000 rows** across all four files,
206
+ with calibrated benchmark validation against 12 metrics drawn from
207
+ authoritative vulnerability intelligence sources (NIST NVD, EPSS v3,
208
+ CISA KEV, Mandiant, Verizon DBIR, Rapid7, Qualys, Tenable).
209
+
210
+ 📧 **pradeep@xpertsystems.ai**
211
+ 🌐 **https://xpertsystems.ai**
212
+
213
+ ## Citation
214
+
215
+ ```bibtex
216
+ @dataset{xpertsystems_cyb009_sample_2026,
217
+ title = {CYB009: Synthetic Vulnerability Intelligence Dataset (Sample)},
218
+ author = {XpertSystems.ai},
219
+ year = {2026},
220
+ url = {https://huggingface.co/datasets/xpertsystems/cyb009-sample}
221
+ }
222
+ ```
223
+
224
+ ## Generation Details
225
+
226
+ - Generator version : 1.0.0
227
+ - Random seed : 42
228
+ - Generated : 2026-05-16 14:32:26 UTC
229
+ - Lifecycle model : 8-phase vulnerability state machine
230
+ - Overall benchmark : 93.0 / 100 (grade A)
asset_inventory.csv ADDED
The diff for this file is too large to render. See raw diff
 
vuln_lifecycle_events.csv ADDED
The diff for this file is too large to render. See raw diff
 
vuln_summary.csv ADDED
The diff for this file is too large to render. See raw diff
 
vulnerability_records.csv ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0c691426eceb9f9e735fe8e8696a2b3f1062e6fd8bd672f18c69bf5784d3eade
3
+ size 46307114