cyb011-sample / README.md
pradeep-xpert's picture
Update README.md
f8be070 verified
---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- adversarial-machine-learning
- ai-security
- adversarial-attacks
- evasion-attacks
- apt
- synthetic-data
- ml-security
- model-robustness
- mlops-security
pretty_name: CYB011 Synthetic AI Evasion Attack Trajectories (Sample)
size_categories:
- 10K<n<100K
---
# CYB011 — Synthetic AI Evasion Attack Trajectory Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB011-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB011 — Synthetic AI Evasion Attack
Trajectory Dataset** product. It contains roughly **~4% of the full dataset**
at identical schema, attacker-tier distribution, and statistical fingerprint,
so you can evaluate fit before licensing the full product.
> 🤖 **Trained baseline + leakage diagnostic available:**
> [**xpertsystems/cyb011-baseline-classifier**](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
> — XGBoost + PyTorch MLP for **7-class adversarial attack phase
> classification** (the dataset's headline target), group-aware split
> by `campaign_id`, multi-seed evaluation (acc 0.867 ± 0.010, ROC-AUC
> 0.977 ± 0.002). **Includes a comprehensive `leakage_diagnostic.json`**
> documenting 6 oracle paths discovered across the dataset's targets,
> 4 README-suggested headline targets that are unlearnable on the
> sample after honest leak removal, and the missing `nation_state`
> attacker tier. Buyers planning adversarial ML research should read
> the diagnostic first.
| File | Rows (sample) | Rows (full) | Description |
|-------------------------------|---------------|---------------|----------------------------------------------|
| `network_topology.csv` | ~200 | ~2,800 | Network segment / defender registry |
| `campaign_summary.csv` | ~200 | ~5,500 | Per-campaign aggregate outcomes |
| `campaign_events.csv` | ~13,310 | ~55,000 | Discrete campaign event log |
| `attack_trajectories.csv` | ~14,000 | ~320,000 | Per-timestep adversarial trajectories |
## Dataset Summary
CYB011 simulates end-to-end **adversarial AI evasion attack campaigns**
against ML-based security detection systems, modeled as a **6-phase
adversarial state machine** (data has 7 phases — adds `idle_dwell`):
- **6 adversarial phases**: reconnaissance → feature_space_probe →
perturbation_craft → evasion_attempt → feedback_adaptation →
campaign_consolidation
- **4 attacker capability tiers**: script_kiddie, opportunistic,
advanced_persistent_threat (APT), nation_state — with per-tier
ε-budgets (L∞ perturbation), query budgets (50 → 5,000), base evasion
rates, and stealth weights
- **8 defender detection architectures** with per-architecture
detection_strength (e.g. ensemble_layered 0.91, gradient_boosted 0.78,
neural_network 0.74, isolation_forest 0.62)
- **L∞ perturbation budget modeling** — calibrated mean ε ≈ 0.185
representing realistic imperceptibility constraints
- **Query budget tracking** — black-box vs white-box attack distinction
- **Concept drift injection** — adversarial data poisoning of training
distributions, ~8% injection rate
- **Retraining trigger modeling** — defender model refresh after drift
detection (~14% trigger rate)
- **Transfer attack modeling** — perturbations crafted on surrogate
models, 31% transfer success rate
- **Honeypot density** — deception model coverage (5% baseline)
- **Coordinated multi-attacker campaigns** with 12% coordination rate
- **MLOps security signals** — gradient access patterns, feature-space
probing, lateral pivoting between models
## Trained Baseline + Leakage Audit Available
A working baseline classifier + comprehensive leakage diagnostic is
published at
**[xpertsystems/cyb011-baseline-classifier](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)**.
| Component | Detail |
|---|---|
| Primary task | **7-class `attack_phase` classification** (the dataset's headline target) |
| Secondary artifact | **`leakage_diagnostic.json`** — 6 oracle paths + 4 unlearnable targets + missing tier note |
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
| Features | 37 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | **Group-aware** (GroupShuffleSplit on `campaign_id`) — 200 campaigns, ~30 in test fold |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.867 ± 0.010, macro ROC-AUC 0.977 ± 0.002 (multi-seed) |
**Important findings for buyers planning CYB011 ML work** (full detail
in
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb011-baseline-classifier/blob/main/leakage_diagnostic.json)):
**Missing `nation_state` attacker tier:** README lists 4 tiers; sample
contains only 3 (script_kiddie 50%, opportunistic 40%, APT 10%).
Nation_state events are entirely absent. Models trained on this
sample cannot generalize to nation_state actors.
**6 oracle paths documented** across the dataset's targets:
**Phase target oracles (3 paths — must be dropped):**
1. `detection_outcome` (`!= suppressed_alert` → 100% `evasion_attempt`)
2. `detector_confidence_score` (threshold-derived from `detection_outcome`)
3. `evasion_budget_consumed` (`== 0` → 100% one of 3 early phases)
**Other documented leaks (for transparency):**
4. `stealth_score` near-deterministic per `attacker_capability_tier` (inflates per-campaign tier prediction from honest ~0.50 to 0.94)
5. Topology fingerprint — 7 segment-level features uniquely identify each `defender_architecture` (makes 8-class defender prediction trivially 100%, collapses to 0.13 when fingerprint dropped)
6. `timestep` partial oracle for 3 phases — **KEPT in the published model as legitimate campaign-progress observable**
**7 phases in data, README claims 6:** The data adds `idle_dwell` as
a phase (17.5% of events). The published baseline trains on all 7.
**4 README-suggested headline targets unlearnable after honest leak
removal:**
- `campaign_success_flag` binary (acc 0.51 vs majority 0.61)
- `campaign_type` 8-class (acc 0.11 vs majority 0.17)
- `coordinated_attack_flag` binary (acc 0.83 vs majority 0.90, only 20 positives)
- `defender_architecture` 8-class (collapses when topology fingerprint dropped)
**Only viable headline target:** `attack_phase` 7-class — acc 0.867,
ROC-AUC 0.977 with group-aware split. All 7 classes earn nonzero F1
(range 0.49-1.00).
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from
authoritative adversarial ML research (MITRE ATLAS, NIST AI 100-2 Adversarial
ML Taxonomy, OWASP ML Top 10, USENIX Security adversarial ML papers, IEEE
SaTML, Microsoft Counterfit, IBM Adversarial Robustness Toolbox, Anthropic /
OpenAI red team reports).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|------|--------|----------|---------|
| evasion_success_rate_apt | 0.1430 | 0.1764 | ✓ PASS |
| detection_rate_ensemble | 0.9100 | 0.9100 | ✓ PASS |
| alert_suppression_rate | 0.0720 | 0.0720 | ✓ PASS |
| perturbation_budget_mean | 0.1850 | 0.1891 | ✓ PASS |
| query_volume_rate | 0.1450 | 0.1250 | ✓ PASS |
| concept_drift_injection_rate | 0.0800 | 0.0600 | ✓ PASS |
| stealth_score_apt | 0.7200 | 0.7200 | ✓ PASS |
| retrain_trigger_rate | 0.1400 | 0.1250 | ✓ PASS |
| campaign_success_rate | 0.3800 | 0.3950 | ✓ PASS |
| lateral_pivot_rate | 0.0950 | 0.0950 | ✓ PASS |
| transfer_attack_success_rate | 0.3100 | 0.3100 | ✓ PASS |
| attribution_risk_score | 0.2800 | 0.3201 | ✓ PASS |
*Every CYB011 benchmark in the sample lands within the same calibrated
tolerance as the full product. The sample uses 200 campaigns (vs 5,500 at
full scale); APT-tier conditional benchmarks (≈ 22% of campaigns) have
~44 samples for robust convergence.*
## Schema Highlights
### `attack_trajectories.csv` (primary file, per-timestep)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| campaign_id | string | Unique adversarial campaign ID |
| attacker_id | string | Attacker ID |
| timestep | int | Step in 6-phase lifecycle (0–69) |
| adversarial_phase | string | 1 of 6 phases |
| attacker_tier | string | script_kiddie / opportunistic / apt / nation_state |
| defender_architecture | string | ensemble / gradient_boosted / nn / isolation_forest / etc. |
| segment_id | string | FK to `network_topology.csv` |
| perturbation_linf | float | L∞ perturbation magnitude (ε) |
| perturbation_l2 | float | L2 perturbation magnitude |
| queries_used | int | Cumulative model queries |
| query_budget_remaining | int | Tier-cap minus queries_used |
| gradient_access | int | Boolean — white-box gradient access |
| evasion_attempted | int | Boolean — evasion submitted at this step |
| evasion_succeeded | int | Boolean — evasion bypassed detection |
| defender_detection_strength | float | Per-architecture detection strength (0–1) |
| concept_drift_injected | int | Boolean — drift injection at this step |
| transfer_attack_used | int | Boolean — perturbation from surrogate model |
| stealth_score | float | Cumulative stealth (0–1) |
| feature_space_dim | int | Target model feature dimensionality |
### `campaign_summary.csv` (per-campaign outcome)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| campaign_id, attacker_id | string | Identifiers |
| attacker_tier | string | Tier classification target |
| defender_architecture | string | Defender model classification target |
| campaign_outcome | string | success / detected / aborted / blocked |
| evasion_success_flag | int | Boolean — evasion ever succeeded |
| total_queries_used | int | Cumulative query count |
| perturbation_budget_mean | float | Mean ε across campaign |
| concept_drift_injected_flag | int | Boolean — drift injection used |
| retrain_triggered_flag | int | Boolean — defender retraining triggered |
| transfer_attack_success_flag | int | Boolean — transfer attack succeeded |
| lateral_pivot_flag | int | Boolean — pivot to second model |
| stealth_score_final | float | Final stealth score |
| attribution_risk_score | float | Likelihood of attribution (0–1) |
See `campaign_events.csv` and `network_topology.csv` for the discrete event
log and segment/defender registry schemas respectively.
## Suggested Use Cases
- Training **adversarial example detectors** — distinguish clean vs
perturbed inputs from feature-space telemetry
- **Attack phase classification** (the baseline ships this) — predict
the 7-phase position of a trajectory event —
[worked example available](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
- **Attacker tier attribution** — 4-class classification of evasion
campaigns by capability tier (see leakage diagnostic — nation_state
tier MISSING from sample; per-campaign prediction inflated by
stealth_score leakage)
- **Defender architecture vulnerability assessment** — predict which
defender architectures are most evadable (see leakage diagnostic —
trivially leaky via topology fingerprint; unlearnable when dropped)
- **L∞ / L2 perturbation budget detection** — calibrate ε-thresholds
- **Query budget exhaustion attacks** — model black-box query patterns
- **Concept drift poisoning detection** — distinguish natural drift
from adversarial injection
- **Transfer attack detection** — identify perturbations crafted on
surrogate models
- **MLOps adversarial robustness benchmarking** — evaluate model
hardening before deployment
- **Honeypot effectiveness analysis** — deception model coverage tuning
- **Adversarial ML threat modeling** — MITRE ATLAS tactic coverage
- **Anthropic / OpenAI-style red team simulation** — synthetic
jailbreak/evasion training data
## Loading the Data
```python
import pandas as pd
trajectories = pd.read_csv("attack_trajectories.csv")
summaries = pd.read_csv("campaign_summary.csv")
events = pd.read_csv("campaign_events.csv")
topology = pd.read_csv("network_topology.csv")
# Join trajectory data with topology (segment-level features)
enriched = trajectories.merge(topology, left_on="target_segment_id",
right_on="segment_id", how="left")
# 7-class attack_phase target (the baseline ships this)
y_phase = trajectories["attack_phase"]
# Multi-class attacker tier (3 values in sample; see leakage diagnostic)
y_tier = trajectories["attacker_capability_tier"]
# Binary evasion success target (see leakage diagnostic — unlearnable)
y_evasion = summaries["campaign_success_flag"]
# Multi-class defender architecture target (see leakage diagnostic —
# trivially leaky via topology fingerprint)
y_defender = topology["defender_architecture"]
```
For a worked end-to-end example with `attack_phase` 7-class
classification, group-aware splitting, feature engineering, and the
full 6-oracle-path leakage audit, see the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb011-baseline-classifier).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB011 dataset includes **~383,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative adversarial ML research sources (MITRE ATLAS, NIST AI 100-2,
OWASP ML Top 10).
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb011_sample_2026,
title = {CYB011: Synthetic AI Evasion Attack Trajectory Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb011-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:56:19 UTC
- Adversarial model : 6-phase evasion campaign state machine
- Overall benchmark : 100.0 / 100 (grade A+)