cyb010-sample / README.md
pradeep-xpert's picture
Update README.md
752e119 verified
---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- siem
- security-logs
- mitre-attack
- apt
- synthetic-data
- alert-triage
- soc-operations
- threat-detection
- splunk
pretty_name: CYB010 Synthetic Security Event Log Dataset (Sample)
size_categories:
- 10K<n<100K
---
# CYB010 — Synthetic Security Event Log Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB010-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB010 — Synthetic Security Event
Log Dataset** product. It contains roughly **~10% of the full dataset** at
identical schema, MITRE ATT&CK technique coverage, and statistical
fingerprint, so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline + leakage diagnostic available:**
> [**xpertsystems/cyb010-baseline-classifier**](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
> — XGBoost + PyTorch MLP for **5-class attack lifecycle phase
> classification** (the dataset's headline target), group-aware split
> by `incident_id`, multi-seed evaluation (acc 0.936 ± 0.007, ROC-AUC
> 0.988 ± 0.001 — tightest AUC std in the catalog). **Includes a
> comprehensive `leakage_diagnostic.json`** documenting 11 oracle
> paths discovered across the dataset's targets and 2 README-suggested
> headline targets that are unlearnable on the sample after honest
> leak removal. Buyers planning SIEM ML work should read the
> diagnostic first.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|----------------------------------------------|
| `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
| `incident_summary.csv` | ~500 | ~4,800 | Per-incident campaign summaries |
| `alert_records.csv` | ~5,162 | ~42,000 | SIEM alert records with triage labels |
| `security_events.csv` | ~21,896 | ~500,000 | Raw security event log records (primary) |
## Dataset Summary
CYB010 simulates enterprise security event logs as a **5-phase attack
lifecycle state machine** across realistic detection environments, with:
- **5 threat actor profiles**: benign_user, script_kiddie, insider_threat,
advanced_persistent_threat (APT), nation_state_actor — each with distinct
fileless execution ratios, log tampering propensities, off-hours bias,
and dwell time distributions
- **4 defender posture tiers**: minimal, standard, hardened, zero_trust —
graduated detection_strength (0.42 → 0.93) and false-positive rates
- **5-phase attack lifecycle**: dormant → initial_access → lateral_movement
→ persistence_establishment → exfiltration_or_impact
- **8 SIEM platform log formats** with realistic per-vendor parsing:
Splunk KV, Microsoft Sentinel JSON, IBM QRadar LEEF, Elastic ECS,
Google Chronicle UDM, AWS Security Hub, Palo Alto XSIAM, ArcSight CEF
- **MITRE ATT&CK v14 coverage** — 50 techniques across 14 tactics, mapped
to all malicious events via T-codes
- **Time-of-day + day-of-week noise model** — Poisson background traffic
with off-hours and weekend multipliers
- **C2 beacon periodicity modeling** — configurable mean interval and
jitter for command-and-control detection
- **IOC seeding density** — calibrated indicator-of-compromise injection
for threat intel detection benchmarking
## Trained Baseline + Leakage Audit Available
A working baseline classifier + comprehensive leakage diagnostic is
published at
**[xpertsystems/cyb010-baseline-classifier](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)**.
| Component | Detail |
|---|---|
| Primary task | **5-class `attack_lifecycle_phase` classification** (the dataset's headline target) |
| Secondary artifact | **`leakage_diagnostic.json`** — 11 oracle paths + 2 unlearnable targets |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 87 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware** (GroupShuffleSplit on `incident_id`) — 500 incidents, ~75 in test fold |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.936 ± 0.007, macro ROC-AUC 0.988 ± 0.001 (multi-seed) |
**Important findings for buyers planning CYB010 ML work** (full detail
in
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb010-baseline-classifier/blob/main/leakage_diagnostic.json)):
**11 oracle paths documented across two task families:**
**Phase target oracles (6 paths)** — drop these when training your own
phase classifier:
1. `mitre_tactic == "benign"` → 100% `benign_background` phase
2. `mitre_technique_id``mitre_tactic` (perfect ATT&CK-by-design oracle)
3. `label_malicious == False` → 100% `benign_background`
4. `threat_actor_id == "NONE"` → 100% benign
5. `threat_actor_profile == "benign_user"` → 100% benign
6. `event_type` (many values phase-specific; e.g. `c2_beacon_outbound` → 100% exfil)
**Alert TP target oracles (7 paths)**`label_true_positive` on
`alert_records.csv` is 100% accurate with any single one of these
intact:
1. `alert_category == "false_positive_noise"` → 100% FP
2. `label_false_positive` (mirror target)
3. `time_to_detect_seconds == 0` → 100% FP (sentinel)
4. `correlated_chain_length == 1` → near-100% FP (sentinel)
5. `analyst_triage_priority ∈ {P1,P2,P3}` → 100% TP
6. `suppression_reason == NaN` → 100% TP
7. `alert_rule_name` (rule names encode answer)
**2 README-suggested headline targets unlearnable after honest leak
removal:**
- `threat_actor_profile` 4-class malicious-only (acc 0.55 vs majority 0.61)
- `event_class` 12-class (acc 0.35 vs majority 0.42)
**Viable secondary task:** `label_true_positive` binary on alerts —
acc 0.80, AUC 0.89 after dropping all 7 oracle columns. Documented in
the diagnostic.
## Calibrated Benchmark Targets
The full product is calibrated to 6 benchmark validation tests drawn from
authoritative SOC operations and threat intelligence research (SANS SOC
Survey, IBM Cost of Data Breach, Mandiant M-Trends, Verizon DBIR, CISA
Joint Advisories, MITRE ATT&CK Evaluations, Splunk State of Security).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| false_positive_alert_rate | 0.4500 | 0.5271 | ~ MARGINAL |
| mean_dwell_time_hours | 504.0 | 479.4 | ✓ PASS |
| lateral_movement_hop_rate | 0.0950 | 0.1040 | ✓ PASS |
| alert_suppression_rate | 0.3800 | 0.4291 | ✓ PASS |
| exfiltration_attempted_rate | 0.3100 | 0.3380 | ✓ PASS |
| patch_compliance_ratio | 0.7200 | 0.7312 | ✓ PASS |
## Schema Highlights
### `security_events.csv` (primary file, raw event logs)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| event_id | string | Unique event identifier |
| incident_id | string | Parent incident FK (nullable for benign) |
| host_id | string | FK to `host_inventory.csv` |
| timestamp_utc | string | ISO timestamp |
| event_type | string | process_create / network_connect / file_write / login / etc. |
| log_format | string | splunk_kv / sentinel_json / qradar_leef / elastic_ecs / etc. |
| raw_log | string | Vendor-formatted log line (key=value, JSON, LEEF, etc.) |
| source_ip | string | Source IP address |
| dest_ip | string | Destination IP address |
| user | string | User account associated with event |
| process_name | string | Process executable name |
| command_line | string | Command line (truncated) |
| mitre_technique_id | string | T-number (e.g. T1059.001) — empty for benign |
| mitre_tactic | string | ATT&CK tactic category |
| threat_actor_profile | string | benign_user / script_kiddie / insider / apt / nation_state |
| attack_phase | string | 1 of 5 lifecycle phases |
| is_off_hours | int | Boolean — outside 9-17 local |
### `alert_records.csv` (SIEM alerts)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| alert_id | string | Unique alert identifier |
| triggering_event_id | string | FK to triggering security event |
| host_id | string | FK to host inventory |
| alert_severity | string | info / low / medium / high / critical |
| detection_rule | string | Rule name that fired |
| label_false_positive | int | Boolean — ground-truth FP label |
| suppressed_flag | int | Boolean — alert suppressed |
| ioc_matched | int | Boolean — IOC database match |
| triage_outcome | string | true_positive / false_positive / suppressed / escalated |
### `incident_summary.csv` (per-incident)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| incident_id | string | Unique incident identifier |
| threat_actor_profile | string | 4-class actor target |
| defender_posture | string | 4-tier defender maturity |
| dwell_time_hours | float | End-to-end attacker dwell |
| lateral_movement_hops | int | Count of lateral movement events |
| exfiltration_attempted_flag | int | Boolean — exfil attempted |
| campaign_success_flag | int | Boolean — campaign succeeded |
| total_events | int | Events generated by this incident |
| total_alerts | int | Alerts triggered |
### `host_inventory.csv` (enterprise hosts)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| host_id | string | Unique host identifier |
| hostname | string | Hostname |
| os_platform | string | windows / linux / macos / etc. |
| defender_posture | string | minimal / standard / hardened / zero_trust |
| patch_compliance_level | float | Patch compliance score (0–1) |
| ip_address | string | Primary IP |
## Suggested Use Cases
- Training **attack lifecycle phase classification** models (the
baseline ships this) —
[worked example available](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
- Training **SIEM alert triage** models — predict true_positive vs
false_positive (see leakage diagnostic — 7 oracle columns must be
dropped; honest acc 0.80 / AUC 0.89)
- **MITRE ATT&CK technique classification** from raw log lines
- **Threat actor attribution** — 5-class with realistic class imbalance
(see leakage diagnostic — 4-class malicious-only is unlearnable;
5-class works only because benign separation is trivial)
- **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
- **Dwell time forecasting** under varying defender posture
- **Lateral movement detection** from event sequences
- **C2 beacon detection** — periodic vs aperiodic network connections
- **IOC matching effectiveness** — calibrated 18.5% match rate baseline
- **Log tampering detection** — APT log-tamper-prob 0.35 baseline
- **Off-hours anomaly detection** — APT off-hours bias 0.64
## Loading the Data
```python
import pandas as pd
events = pd.read_csv("security_events.csv")
alerts = pd.read_csv("alert_records.csv")
incidents = pd.read_csv("incident_summary.csv")
hosts = pd.read_csv("host_inventory.csv")
# Join events to host context
enriched = events.merge(hosts, on="host_id", how="left",
suffixes=("", "_host"))
# Join alerts back to source event and incident
alerts_full = alerts.merge(events, left_on="correlated_event_ids",
right_on="event_id", how="left",
suffixes=("_alert", "_event"))
# 5-class attack lifecycle phase target (the baseline ships this)
y_phase = events["attack_lifecycle_phase"]
# Multi-class threat actor profile target (5-class with benign;
# see leakage diagnostic — 4-class malicious-only is unlearnable)
y_actor = events["threat_actor_profile"]
# Binary false-positive prediction target
# (see leakage diagnostic — 7 oracle columns must be dropped)
y_fp = alerts["label_false_positive"]
# Multi-class MITRE technique target (filter to malicious events)
malicious = events[events["label_malicious"] == True]
y_technique = malicious["mitre_technique_id"]
```
For a worked end-to-end example with `attack_lifecycle_phase` 5-class
classification, group-aware splitting, feature engineering, and the
full 11-oracle-path leakage audit, see the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb010-baseline-classifier).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB010 dataset includes **~550,000 rows** across all four files,
with calibrated benchmark validation against 6 metrics drawn from
authoritative SOC operations and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb010_sample_2026,
title = {CYB010: Synthetic Security Event Log Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb010-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:37:46 UTC
- Attack lifecycle : 5-phase finite state machine
- Overall benchmark : 95.3 / 100 (grade A)