File size: 15,399 Bytes
1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 752e119 1a74c11 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 | ---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- siem
- security-logs
- mitre-attack
- apt
- synthetic-data
- alert-triage
- soc-operations
- threat-detection
- splunk
pretty_name: CYB010 — Synthetic Security Event Log Dataset (Sample)
size_categories:
- 10K<n<100K
---
# CYB010 — Synthetic Security Event Log Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB010-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB010 — Synthetic Security Event
Log Dataset** product. It contains roughly **~10% of the full dataset** at
identical schema, MITRE ATT&CK technique coverage, and statistical
fingerprint, so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline + leakage diagnostic available:**
> [**xpertsystems/cyb010-baseline-classifier**](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
> — XGBoost + PyTorch MLP for **5-class attack lifecycle phase
> classification** (the dataset's headline target), group-aware split
> by `incident_id`, multi-seed evaluation (acc 0.936 ± 0.007, ROC-AUC
> 0.988 ± 0.001 — tightest AUC std in the catalog). **Includes a
> comprehensive `leakage_diagnostic.json`** documenting 11 oracle
> paths discovered across the dataset's targets and 2 README-suggested
> headline targets that are unlearnable on the sample after honest
> leak removal. Buyers planning SIEM ML work should read the
> diagnostic first.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|----------------------------------------------|
| `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
| `incident_summary.csv` | ~500 | ~4,800 | Per-incident campaign summaries |
| `alert_records.csv` | ~5,162 | ~42,000 | SIEM alert records with triage labels |
| `security_events.csv` | ~21,896 | ~500,000 | Raw security event log records (primary) |
## Dataset Summary
CYB010 simulates enterprise security event logs as a **5-phase attack
lifecycle state machine** across realistic detection environments, with:
- **5 threat actor profiles**: benign_user, script_kiddie, insider_threat,
advanced_persistent_threat (APT), nation_state_actor — each with distinct
fileless execution ratios, log tampering propensities, off-hours bias,
and dwell time distributions
- **4 defender posture tiers**: minimal, standard, hardened, zero_trust —
graduated detection_strength (0.42 → 0.93) and false-positive rates
- **5-phase attack lifecycle**: dormant → initial_access → lateral_movement
→ persistence_establishment → exfiltration_or_impact
- **8 SIEM platform log formats** with realistic per-vendor parsing:
Splunk KV, Microsoft Sentinel JSON, IBM QRadar LEEF, Elastic ECS,
Google Chronicle UDM, AWS Security Hub, Palo Alto XSIAM, ArcSight CEF
- **MITRE ATT&CK v14 coverage** — 50 techniques across 14 tactics, mapped
to all malicious events via T-codes
- **Time-of-day + day-of-week noise model** — Poisson background traffic
with off-hours and weekend multipliers
- **C2 beacon periodicity modeling** — configurable mean interval and
jitter for command-and-control detection
- **IOC seeding density** — calibrated indicator-of-compromise injection
for threat intel detection benchmarking
## Trained Baseline + Leakage Audit Available
A working baseline classifier + comprehensive leakage diagnostic is
published at
**[xpertsystems/cyb010-baseline-classifier](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)**.
| Component | Detail |
|---|---|
| Primary task | **5-class `attack_lifecycle_phase` classification** (the dataset's headline target) |
| Secondary artifact | **`leakage_diagnostic.json`** — 11 oracle paths + 2 unlearnable targets |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 87 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware** (GroupShuffleSplit on `incident_id`) — 500 incidents, ~75 in test fold |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.936 ± 0.007, macro ROC-AUC 0.988 ± 0.001 (multi-seed) |
**Important findings for buyers planning CYB010 ML work** (full detail
in
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb010-baseline-classifier/blob/main/leakage_diagnostic.json)):
**11 oracle paths documented across two task families:**
**Phase target oracles (6 paths)** — drop these when training your own
phase classifier:
1. `mitre_tactic == "benign"` → 100% `benign_background` phase
2. `mitre_technique_id` → `mitre_tactic` (perfect ATT&CK-by-design oracle)
3. `label_malicious == False` → 100% `benign_background`
4. `threat_actor_id == "NONE"` → 100% benign
5. `threat_actor_profile == "benign_user"` → 100% benign
6. `event_type` (many values phase-specific; e.g. `c2_beacon_outbound` → 100% exfil)
**Alert TP target oracles (7 paths)** — `label_true_positive` on
`alert_records.csv` is 100% accurate with any single one of these
intact:
1. `alert_category == "false_positive_noise"` → 100% FP
2. `label_false_positive` (mirror target)
3. `time_to_detect_seconds == 0` → 100% FP (sentinel)
4. `correlated_chain_length == 1` → near-100% FP (sentinel)
5. `analyst_triage_priority ∈ {P1,P2,P3}` → 100% TP
6. `suppression_reason == NaN` → 100% TP
7. `alert_rule_name` (rule names encode answer)
**2 README-suggested headline targets unlearnable after honest leak
removal:**
- `threat_actor_profile` 4-class malicious-only (acc 0.55 vs majority 0.61)
- `event_class` 12-class (acc 0.35 vs majority 0.42)
**Viable secondary task:** `label_true_positive` binary on alerts —
acc 0.80, AUC 0.89 after dropping all 7 oracle columns. Documented in
the diagnostic.
## Calibrated Benchmark Targets
The full product is calibrated to 6 benchmark validation tests drawn from
authoritative SOC operations and threat intelligence research (SANS SOC
Survey, IBM Cost of Data Breach, Mandiant M-Trends, Verizon DBIR, CISA
Joint Advisories, MITRE ATT&CK Evaluations, Splunk State of Security).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| false_positive_alert_rate | 0.4500 | 0.5271 | ~ MARGINAL |
| mean_dwell_time_hours | 504.0 | 479.4 | ✓ PASS |
| lateral_movement_hop_rate | 0.0950 | 0.1040 | ✓ PASS |
| alert_suppression_rate | 0.3800 | 0.4291 | ✓ PASS |
| exfiltration_attempted_rate | 0.3100 | 0.3380 | ✓ PASS |
| patch_compliance_ratio | 0.7200 | 0.7312 | ✓ PASS |
## Schema Highlights
### `security_events.csv` (primary file, raw event logs)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| event_id | string | Unique event identifier |
| incident_id | string | Parent incident FK (nullable for benign) |
| host_id | string | FK to `host_inventory.csv` |
| timestamp_utc | string | ISO timestamp |
| event_type | string | process_create / network_connect / file_write / login / etc. |
| log_format | string | splunk_kv / sentinel_json / qradar_leef / elastic_ecs / etc. |
| raw_log | string | Vendor-formatted log line (key=value, JSON, LEEF, etc.) |
| source_ip | string | Source IP address |
| dest_ip | string | Destination IP address |
| user | string | User account associated with event |
| process_name | string | Process executable name |
| command_line | string | Command line (truncated) |
| mitre_technique_id | string | T-number (e.g. T1059.001) — empty for benign |
| mitre_tactic | string | ATT&CK tactic category |
| threat_actor_profile | string | benign_user / script_kiddie / insider / apt / nation_state |
| attack_phase | string | 1 of 5 lifecycle phases |
| is_off_hours | int | Boolean — outside 9-17 local |
### `alert_records.csv` (SIEM alerts)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| alert_id | string | Unique alert identifier |
| triggering_event_id | string | FK to triggering security event |
| host_id | string | FK to host inventory |
| alert_severity | string | info / low / medium / high / critical |
| detection_rule | string | Rule name that fired |
| label_false_positive | int | Boolean — ground-truth FP label |
| suppressed_flag | int | Boolean — alert suppressed |
| ioc_matched | int | Boolean — IOC database match |
| triage_outcome | string | true_positive / false_positive / suppressed / escalated |
### `incident_summary.csv` (per-incident)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| incident_id | string | Unique incident identifier |
| threat_actor_profile | string | 4-class actor target |
| defender_posture | string | 4-tier defender maturity |
| dwell_time_hours | float | End-to-end attacker dwell |
| lateral_movement_hops | int | Count of lateral movement events |
| exfiltration_attempted_flag | int | Boolean — exfil attempted |
| campaign_success_flag | int | Boolean — campaign succeeded |
| total_events | int | Events generated by this incident |
| total_alerts | int | Alerts triggered |
### `host_inventory.csv` (enterprise hosts)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| host_id | string | Unique host identifier |
| hostname | string | Hostname |
| os_platform | string | windows / linux / macos / etc. |
| defender_posture | string | minimal / standard / hardened / zero_trust |
| patch_compliance_level | float | Patch compliance score (0–1) |
| ip_address | string | Primary IP |
## Suggested Use Cases
- Training **attack lifecycle phase classification** models (the
baseline ships this) —
[worked example available](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
- Training **SIEM alert triage** models — predict true_positive vs
false_positive (see leakage diagnostic — 7 oracle columns must be
dropped; honest acc 0.80 / AUC 0.89)
- **MITRE ATT&CK technique classification** from raw log lines
- **Threat actor attribution** — 5-class with realistic class imbalance
(see leakage diagnostic — 4-class malicious-only is unlearnable;
5-class works only because benign separation is trivial)
- **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
- **Dwell time forecasting** under varying defender posture
- **Lateral movement detection** from event sequences
- **C2 beacon detection** — periodic vs aperiodic network connections
- **IOC matching effectiveness** — calibrated 18.5% match rate baseline
- **Log tampering detection** — APT log-tamper-prob 0.35 baseline
- **Off-hours anomaly detection** — APT off-hours bias 0.64
## Loading the Data
```python
import pandas as pd
events = pd.read_csv("security_events.csv")
alerts = pd.read_csv("alert_records.csv")
incidents = pd.read_csv("incident_summary.csv")
hosts = pd.read_csv("host_inventory.csv")
# Join events to host context
enriched = events.merge(hosts, on="host_id", how="left",
suffixes=("", "_host"))
# Join alerts back to source event and incident
alerts_full = alerts.merge(events, left_on="correlated_event_ids",
right_on="event_id", how="left",
suffixes=("_alert", "_event"))
# 5-class attack lifecycle phase target (the baseline ships this)
y_phase = events["attack_lifecycle_phase"]
# Multi-class threat actor profile target (5-class with benign;
# see leakage diagnostic — 4-class malicious-only is unlearnable)
y_actor = events["threat_actor_profile"]
# Binary false-positive prediction target
# (see leakage diagnostic — 7 oracle columns must be dropped)
y_fp = alerts["label_false_positive"]
# Multi-class MITRE technique target (filter to malicious events)
malicious = events[events["label_malicious"] == True]
y_technique = malicious["mitre_technique_id"]
```
For a worked end-to-end example with `attack_lifecycle_phase` 5-class
classification, group-aware splitting, feature engineering, and the
full 11-oracle-path leakage audit, see the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb010-baseline-classifier).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB010 dataset includes **~550,000 rows** across all four files,
with calibrated benchmark validation against 6 metrics drawn from
authoritative SOC operations and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb010_sample_2026,
title = {CYB010: Synthetic Security Event Log Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb010-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:37:46 UTC
- Attack lifecycle : 5-phase finite state machine
- Overall benchmark : 95.3 / 100 (grade A)
|