File size: 15,399 Bytes
1a74c11
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
752e119
 
 
 
 
 
 
 
 
 
 
 
1a74c11
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
752e119
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1a74c11
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
752e119
 
 
 
 
 
1a74c11
 
752e119
 
1a74c11
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
752e119
1a74c11
 
 
752e119
 
 
 
 
1a74c11
 
 
752e119
1a74c11
 
 
752e119
1a74c11
 
 
752e119
 
 
 
 
1a74c11
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
---
license: cc-by-nc-4.0
task_categories:
  - tabular-classification
  - time-series-forecasting
tags:
  - cybersecurity
  - siem
  - security-logs
  - mitre-attack
  - apt
  - synthetic-data
  - alert-triage
  - soc-operations
  - threat-detection
  - splunk
pretty_name: CYB010  Synthetic Security Event Log Dataset (Sample)
size_categories:
  - 10K<n<100K
---

# CYB010 — Synthetic Security Event Log Dataset (Sample)

**XpertSystems.ai Synthetic Data Platform · SKU: CYB010-SAMPLE · Version 1.0.0**

This is a **free preview** of the full **CYB010 — Synthetic Security Event
Log Dataset** product. It contains roughly **~10% of the full dataset** at
identical schema, MITRE ATT&CK technique coverage, and statistical
fingerprint, so you can evaluate fit before licensing the full product.

> 🤖 **Trained baseline + leakage diagnostic available:**
> [**xpertsystems/cyb010-baseline-classifier**](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
> — XGBoost + PyTorch MLP for **5-class attack lifecycle phase
> classification** (the dataset's headline target), group-aware split
> by `incident_id`, multi-seed evaluation (acc 0.936 ± 0.007, ROC-AUC
> 0.988 ± 0.001 — tightest AUC std in the catalog). **Includes a
> comprehensive `leakage_diagnostic.json`** documenting 11 oracle
> paths discovered across the dataset's targets and 2 README-suggested
> headline targets that are unlearnable on the sample after honest
> leak removal. Buyers planning SIEM ML work should read the
> diagnostic first.

| File                       | Rows (sample) | Rows (full)   | Description                                  |
|----------------------------|---------------|---------------|----------------------------------------------|
| `host_inventory.csv`       | ~400           | ~3,200        | Enterprise host inventory                    |
| `incident_summary.csv`     | ~500           | ~4,800        | Per-incident campaign summaries              |
| `alert_records.csv`        | ~5,162         | ~42,000       | SIEM alert records with triage labels        |
| `security_events.csv`      | ~21,896        | ~500,000      | Raw security event log records (primary)     |

## Dataset Summary

CYB010 simulates enterprise security event logs as a **5-phase attack
lifecycle state machine** across realistic detection environments, with:

- **5 threat actor profiles**: benign_user, script_kiddie, insider_threat,
  advanced_persistent_threat (APT), nation_state_actor — each with distinct
  fileless execution ratios, log tampering propensities, off-hours bias,
  and dwell time distributions
- **4 defender posture tiers**: minimal, standard, hardened, zero_trust —
  graduated detection_strength (0.42 → 0.93) and false-positive rates
- **5-phase attack lifecycle**: dormant → initial_access → lateral_movement
  → persistence_establishment → exfiltration_or_impact
- **8 SIEM platform log formats** with realistic per-vendor parsing:
  Splunk KV, Microsoft Sentinel JSON, IBM QRadar LEEF, Elastic ECS,
  Google Chronicle UDM, AWS Security Hub, Palo Alto XSIAM, ArcSight CEF
- **MITRE ATT&CK v14 coverage** — 50 techniques across 14 tactics, mapped
  to all malicious events via T-codes
- **Time-of-day + day-of-week noise model** — Poisson background traffic
  with off-hours and weekend multipliers
- **C2 beacon periodicity modeling** — configurable mean interval and
  jitter for command-and-control detection
- **IOC seeding density** — calibrated indicator-of-compromise injection
  for threat intel detection benchmarking

## Trained Baseline + Leakage Audit Available

A working baseline classifier + comprehensive leakage diagnostic is
published at
**[xpertsystems/cyb010-baseline-classifier](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)**.

| Component | Detail |
|---|---|
| Primary task | **5-class `attack_lifecycle_phase` classification** (the dataset's headline target) |
| Secondary artifact | **`leakage_diagnostic.json`** — 11 oracle paths + 2 unlearnable targets |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 87 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware** (GroupShuffleSplit on `incident_id`) — 500 incidents, ~75 in test fold |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.936 ± 0.007, macro ROC-AUC 0.988 ± 0.001 (multi-seed) |

**Important findings for buyers planning CYB010 ML work** (full detail
in
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb010-baseline-classifier/blob/main/leakage_diagnostic.json)):

**11 oracle paths documented across two task families:**

**Phase target oracles (6 paths)** — drop these when training your own
phase classifier:

1. `mitre_tactic == "benign"` → 100% `benign_background` phase
2. `mitre_technique_id``mitre_tactic` (perfect ATT&CK-by-design oracle)
3. `label_malicious == False` → 100% `benign_background`
4. `threat_actor_id == "NONE"` → 100% benign
5. `threat_actor_profile == "benign_user"` → 100% benign
6. `event_type` (many values phase-specific; e.g. `c2_beacon_outbound` → 100% exfil)

**Alert TP target oracles (7 paths)**`label_true_positive` on
`alert_records.csv` is 100% accurate with any single one of these
intact:

1. `alert_category == "false_positive_noise"` → 100% FP
2. `label_false_positive` (mirror target)
3. `time_to_detect_seconds == 0` → 100% FP (sentinel)
4. `correlated_chain_length == 1` → near-100% FP (sentinel)
5. `analyst_triage_priority ∈ {P1,P2,P3}` → 100% TP
6. `suppression_reason == NaN` → 100% TP
7. `alert_rule_name` (rule names encode answer)

**2 README-suggested headline targets unlearnable after honest leak
removal:**
- `threat_actor_profile` 4-class malicious-only (acc 0.55 vs majority 0.61)
- `event_class` 12-class (acc 0.35 vs majority 0.42)

**Viable secondary task:** `label_true_positive` binary on alerts —
acc 0.80, AUC 0.89 after dropping all 7 oracle columns. Documented in
the diagnostic.

## Calibrated Benchmark Targets

The full product is calibrated to 6 benchmark validation tests drawn from
authoritative SOC operations and threat intelligence research (SANS SOC
Survey, IBM Cost of Data Breach, Mandiant M-Trends, Verizon DBIR, CISA
Joint Advisories, MITRE ATT&CK Evaluations, Splunk State of Security).

Sample benchmark results:

| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| false_positive_alert_rate | 0.4500 | 0.5271 | ~ MARGINAL |
| mean_dwell_time_hours | 504.0 | 479.4 | ✓ PASS |
| lateral_movement_hop_rate | 0.0950 | 0.1040 | ✓ PASS |
| alert_suppression_rate | 0.3800 | 0.4291 | ✓ PASS |
| exfiltration_attempted_rate | 0.3100 | 0.3380 | ✓ PASS |
| patch_compliance_ratio | 0.7200 | 0.7312 | ✓ PASS |

## Schema Highlights

### `security_events.csv` (primary file, raw event logs)

| Column                          | Type    | Description                                  |
|---------------------------------|---------|----------------------------------------------|
| event_id                        | string  | Unique event identifier                      |
| incident_id                     | string  | Parent incident FK (nullable for benign)     |
| host_id                         | string  | FK to `host_inventory.csv`                   |
| timestamp_utc                   | string  | ISO timestamp                                |
| event_type                      | string  | process_create / network_connect / file_write / login / etc. |
| log_format                      | string  | splunk_kv / sentinel_json / qradar_leef / elastic_ecs / etc. |
| raw_log                         | string  | Vendor-formatted log line (key=value, JSON, LEEF, etc.) |
| source_ip                       | string  | Source IP address                            |
| dest_ip                         | string  | Destination IP address                       |
| user                            | string  | User account associated with event           |
| process_name                    | string  | Process executable name                      |
| command_line                    | string  | Command line (truncated)                     |
| mitre_technique_id              | string  | T-number (e.g. T1059.001) — empty for benign |
| mitre_tactic                    | string  | ATT&CK tactic category                       |
| threat_actor_profile            | string  | benign_user / script_kiddie / insider / apt / nation_state |
| attack_phase                    | string  | 1 of 5 lifecycle phases                      |
| is_off_hours                    | int     | Boolean — outside 9-17 local                 |

### `alert_records.csv` (SIEM alerts)

| Column                          | Type    | Description                                  |
|---------------------------------|---------|----------------------------------------------|
| alert_id                        | string  | Unique alert identifier                      |
| triggering_event_id             | string  | FK to triggering security event              |
| host_id                         | string  | FK to host inventory                         |
| alert_severity                  | string  | info / low / medium / high / critical        |
| detection_rule                  | string  | Rule name that fired                         |
| label_false_positive            | int     | Boolean — ground-truth FP label              |
| suppressed_flag                 | int     | Boolean — alert suppressed                   |
| ioc_matched                     | int     | Boolean — IOC database match                 |
| triage_outcome                  | string  | true_positive / false_positive / suppressed / escalated |

### `incident_summary.csv` (per-incident)

| Column                          | Type    | Description                                  |
|---------------------------------|---------|----------------------------------------------|
| incident_id                     | string  | Unique incident identifier                   |
| threat_actor_profile            | string  | 4-class actor target                         |
| defender_posture                | string  | 4-tier defender maturity                     |
| dwell_time_hours                | float   | End-to-end attacker dwell                    |
| lateral_movement_hops           | int     | Count of lateral movement events             |
| exfiltration_attempted_flag     | int     | Boolean — exfil attempted                    |
| campaign_success_flag           | int     | Boolean — campaign succeeded                 |
| total_events                    | int     | Events generated by this incident            |
| total_alerts                    | int     | Alerts triggered                             |

### `host_inventory.csv` (enterprise hosts)

| Column                          | Type    | Description                                  |
|---------------------------------|---------|----------------------------------------------|
| host_id                         | string  | Unique host identifier                       |
| hostname                        | string  | Hostname                                     |
| os_platform                     | string  | windows / linux / macos / etc.               |
| defender_posture                | string  | minimal / standard / hardened / zero_trust   |
| patch_compliance_level          | float   | Patch compliance score (0–1)                 |
| ip_address                      | string  | Primary IP                                   |

## Suggested Use Cases

- Training **attack lifecycle phase classification** models (the
  baseline ships this) —
  [worked example available](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
- Training **SIEM alert triage** models — predict true_positive vs
  false_positive (see leakage diagnostic — 7 oracle columns must be
  dropped; honest acc 0.80 / AUC 0.89)
- **MITRE ATT&CK technique classification** from raw log lines
- **Threat actor attribution** — 5-class with realistic class imbalance
  (see leakage diagnostic — 4-class malicious-only is unlearnable;
  5-class works only because benign separation is trivial)
- **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
- **Dwell time forecasting** under varying defender posture
- **Lateral movement detection** from event sequences
- **C2 beacon detection** — periodic vs aperiodic network connections
- **IOC matching effectiveness** — calibrated 18.5% match rate baseline
- **Log tampering detection** — APT log-tamper-prob 0.35 baseline
- **Off-hours anomaly detection** — APT off-hours bias 0.64

## Loading the Data

```python
import pandas as pd

events    = pd.read_csv("security_events.csv")
alerts    = pd.read_csv("alert_records.csv")
incidents = pd.read_csv("incident_summary.csv")
hosts     = pd.read_csv("host_inventory.csv")

# Join events to host context
enriched = events.merge(hosts, on="host_id", how="left",
                        suffixes=("", "_host"))

# Join alerts back to source event and incident
alerts_full = alerts.merge(events, left_on="correlated_event_ids",
                           right_on="event_id", how="left",
                           suffixes=("_alert", "_event"))

# 5-class attack lifecycle phase target (the baseline ships this)
y_phase = events["attack_lifecycle_phase"]

# Multi-class threat actor profile target (5-class with benign;
# see leakage diagnostic — 4-class malicious-only is unlearnable)
y_actor = events["threat_actor_profile"]

# Binary false-positive prediction target
# (see leakage diagnostic — 7 oracle columns must be dropped)
y_fp = alerts["label_false_positive"]

# Multi-class MITRE technique target (filter to malicious events)
malicious = events[events["label_malicious"] == True]
y_technique = malicious["mitre_technique_id"]
```

For a worked end-to-end example with `attack_lifecycle_phase` 5-class
classification, group-aware splitting, feature engineering, and the
full 11-oracle-path leakage audit, see the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb010-baseline-classifier).

## License

This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.

## Full Product

The full CYB010 dataset includes **~550,000 rows** across all four files,
with calibrated benchmark validation against 6 metrics drawn from
authoritative SOC operations and threat intelligence sources.

📧  **pradeep@xpertsystems.ai**
🌐  **https://xpertsystems.ai**

## Citation

```bibtex
@dataset{xpertsystems_cyb010_sample_2026,
  title  = {CYB010: Synthetic Security Event Log Dataset (Sample)},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/datasets/xpertsystems/cyb010-sample}
}
```

## Generation Details

- Generator version : 1.0.0
- Random seed       : 42
- Generated         : 2026-05-16 14:37:46 UTC
- Attack lifecycle  : 5-phase finite state machine
- Overall benchmark : 95.3 / 100  (grade A)