--- license: cc-by-nc-4.0 library_name: pytorch tags: - cybersecurity - identity-security - insider-threat - ueba - user-risk-scoring - tabular-classification - synthetic-data - xgboost - baseline - leakage-diagnostic pipeline_tag: tabular-classification base_model: [] datasets: - xpertsystems/cyb006-sample metrics: - accuracy - f1 - roc_auc model-index: - name: cyb006-baseline-classifier results: - task: type: tabular-classification name: 3-class user risk tier classification dataset: type: xpertsystems/cyb006-sample name: CYB006 Synthetic Login Activity Dataset (Sample) metrics: - type: roc_auc value: 0.8017 name: Test macro ROC-AUC OvR (XGBoost, seed 42) - type: accuracy value: 0.6667 name: Test accuracy (XGBoost, seed 42) - type: f1 value: 0.6454 name: Test macro-F1 (XGBoost, seed 42) - type: accuracy value: 0.700 name: Multi-seed accuracy mean ± 0.082 (XGBoost, 10 seeds) - type: roc_auc value: 0.812 name: Multi-seed ROC-AUC mean ± 0.048 (XGBoost, 10 seeds) - type: roc_auc value: 0.6974 name: Test macro ROC-AUC OvR (MLP, seed 42) - type: accuracy value: 0.6000 name: Test accuracy (MLP, seed 42) - type: f1 value: 0.5914 name: Test macro-F1 (MLP, seed 42) --- # CYB006 Baseline Classifier **User-risk-tier classifier trained on the CYB006 synthetic login activity sample. Predicts which of 3 risk tiers (`low` / `medium` / `high`) a user belongs to, from per-user identity aggregates and non-leaky session aggregates. ALSO ships a leakage diagnostic for the README's stated headline use case (threat-actor tier classification).** > **Read this first.** This repo ships two artifacts: (1) a working > baseline classifier for `user_risk_tier` (the primary product), and > (2) a separate diagnostic file (`leakage_diagnostic.json`) > documenting why the README's stated headline use case — 4-class > threat-actor tier classification — is not a usable ML task on the > sample dataset. Both matter; the diagnostic is required reading for > anyone evaluating CYB006 for a threat-detection product. ## Model overview | Property | Value | |---|---| | Primary task | 3-class user_risk_tier classification (`low`/`medium`/`high`) | | Secondary artifact | `leakage_diagnostic.json` — audit of threat-actor detection on this sample | | Training data | `xpertsystems/cyb006-sample` (200 users × 25 sessions = 5,000 sessions) | | Models | XGBoost + PyTorch MLP | | Input features | 34 (per-user aggregates + session aggregates + engineered) | | Split | **Stratified by user_risk_tier** (this is a user-level task, n=200) | | Validation | Single seed (artifact) + multi-seed aggregate across 10 seeds | | License | CC-BY-NC-4.0 (matches dataset) | | Status | Reference baseline + structural-leakage diagnostic | ## Why this task — and why not threat-actor classification? The CYB006 README's first suggested use case is "training **account takeover (ATO) detection** models" and second is "**threat-actor tier classification** — 4-class with realistic class imbalance". We piloted the threat-actor target first and discovered that the sample dataset contains **structural distributional non-overlap** between threat-actor and legitimate session populations across at least six independent feature groups: | Oracle feature | Actor range / value | Non-actor range / value | |---|---|---| | `velocity_anomaly_score` | [0.52, 0.82] | [0.00, 0.25] — **zero overlap** | | `session_timestamp_utc` | [6,417, 1,440,062] | [1,445,187, 18,000,137] — **disjoint windows** | | `credential_attempt_count` | [1, 59] (mean 12.9) | [1, 2] (mean 1.07) | | `login_outcome` | `success_normal` only occurs for non-actors; `failure_account_locked` / `account_takeover_confirmed` / `session_hijacked` / `success_anomalous` only occur for actors | | `geo_country_code` | `KP`, `XX`, `CN`, `BY` appear only for actors | | `device_trust_level` | `trusted_managed` / `compliant_enrolled` appear only for non-actors | As a consequence, **plain XGBoost achieves 100% test accuracy on threat-actor binary detection (any-actor vs none) across every random seed**, and stays at **97% accuracy and AUC 0.99 even with all six oracle feature groups dropped** (40+ columns excluded). This is not a useful ML benchmark; it's a property of the synthetic generator. Real identity-security telemetry has substantial overlap between threat and legitimate behaviour, with state-of-the-art detection systems operating at AUC 0.7–0.9, not 1.0. The diagnostic finding is documented quantitatively in [`leakage_diagnostic.json`](./leakage_diagnostic.json) and summarised in the [Leakage diagnostic](#leakage-diagnostic) section below. We therefore pivoted to **`user_risk_tier` (3-class user-level classification)** as the primary baseline target. This task: - Has **overlapping per-tier feature distributions** — no oracle features - Carries **modest real signal** (acc 0.66, AUC 0.80 over majority 0.57) - Targets a legitimate use case (the README lists "Insider threat scoring with composite behavioral indicators") - Demonstrates honest ML rigor on the dataset Two model artifacts are published. They are designed to be used together — disagreement is a useful triage signal: - `model_xgb.json` — gradient-boosted trees, primary recommendation - `model_mlp.safetensors` — PyTorch MLP in SafeTensors format ## Quick start ```bash pip install xgboost torch safetensors pandas huggingface_hub ``` ```python from huggingface_hub import hf_hub_download import json, numpy as np, torch, xgboost as xgb from safetensors.torch import load_file REPO = "xpertsystems/cyb006-baseline-classifier" paths = {n: hf_hub_download(REPO, n) for n in [ "model_xgb.json", "model_mlp.safetensors", "feature_engineering.py", "feature_meta.json", "feature_scaler.json", ]} import sys, os sys.path.insert(0, os.path.dirname(paths["feature_engineering.py"])) from feature_engineering import ( transform_single, load_meta, INT_TO_LABEL, compute_session_aggregates_for_user ) meta = load_meta(paths["feature_meta.json"]) xgb_model = xgb.XGBClassifier(); xgb_model.load_model(paths["model_xgb.json"]) # Compose a per-user record from user_risk_summary row + session aggregates user_record = user_summary_row.to_dict() user_record.update(compute_session_aggregates_for_user(user_sessions)) X = transform_single(user_record, meta) proba = xgb_model.predict_proba(X)[0] print(INT_TO_LABEL[int(np.argmax(proba))]) ``` See [`inference_example.ipynb`](./inference_example.ipynb) for the full copy-paste demo. ## Training data Trained on the public sample of CYB006, 200 per-user rows from `user_risk_summary.csv` enriched with per-user session aggregates computed from `login_sessions.csv`: | Tier | Users | Class share | |---|---:|---:| | `low` | 114 | 57% | | `medium` | 47 | 23.5% | | `high` | 39 | 19.5% | The CYB006 README claims a 4-tier scheme (`low`/`medium`/`high`/`critical`). The sample data contains only 3 — there is no `critical` tier present. ### Stratified split This is a **user-level** task (one row per user, 200 users total). Group-aware splitting does not apply since there is no many-rows-per-group structure to leak. We use **StratifiedShuffleSplit** (nested 70/15/15) to preserve the 3-tier class distribution across folds: | Fold | Users | |---|---:| | Train | 139 | | Validation | 31 | | Test | 30 | Class imbalance is addressed with `class_weight='balanced'` (XGBoost `sample_weight`) and weighted cross-entropy (MLP). ## Feature pipeline The bundled `feature_engineering.py` is the canonical feature recipe. 34 features survive after encoding, drawn from: - **Per-user numeric** (14, from `user_risk_summary.csv`): `total_login_attempts`, `successful_logins`, `failed_logins`, `mfa_failures`, `impossible_travel_events`, `lateral_hop_count`, `privilege_escalations`, `account_lockout_count`, `geo_dispersion_score`, `login_velocity_score`, `session_anomaly_rate`, `ueba_alert_count`, `overall_identity_risk_score`, `insider_threat_indicator_score` - **Per-user categorical** (1, one-hot): `peak_privilege_level_accessed` (6 values) - **Session aggregates** (8, derived from `login_sessions.csv`): `avg_session_duration_seconds`, `avg_mfa_response_latency_ms`, `avg_geo_anomaly_score`, `max_geo_anomaly_score`, `frac_impossible_travel`, `n_unique_countries`, `n_unique_devices`, `n_unique_applications` - **Engineered** (6): `failed_login_rate`, `mfa_failure_rate`, `ueba_alerts_per_session`, `hops_per_escalation`, `geo_velocity_composite`, `composite_anomaly_score` ### Leakage exclusions Three columns from `user_risk_summary.csv` are dropped to avoid contamination: - `threat_actor_flag` — perfect oracle for `tier='high'` subset (only high-tier users can be threat actors) - `account_takeover_flag` — 2 positive cases out of 200 (1%); too sparse and oracle-prone - `credential_attack_victim_flag` — 1 positive case out of 200 (0.5%); same issue Four columns from `login_sessions.csv` are NOT aggregated into session features because they exhibited the structural non-overlap documented in [Leakage diagnostic](#leakage-diagnostic): - `velocity_anomaly_score`, `session_timestamp_utc`, `credential_attempt_count`, `login_outcome` ## Evaluation ### Test-set metrics, seed 42 (n = 30 disjoint users) **XGBoost** (the published `model_xgb.json` artifact) | Metric | Value | |---|---:| | Macro ROC-AUC (OvR) | **0.8017** | | Accuracy | **0.6667** | | Macro-F1 | 0.6454 | | Weighted-F1 | 0.6606 | **MLP** (the published `model_mlp.safetensors` artifact) | Metric | Value | |---|---:| | Macro ROC-AUC (OvR) | 0.6974 | | Accuracy | 0.6000 | | Macro-F1 | 0.5914 | | Weighted-F1 | 0.6068 | ### Multi-seed robustness (XGBoost, 10 seeds) | Metric | Mean | Std | Min | Max | |---|---:|---:|---:|---:| | Accuracy | 0.700 | 0.082 | 0.533 | 0.867 | | Macro-F1 | 0.638 | 0.093 | 0.445 | 0.814 | | Macro ROC-AUC OvR | 0.812 | 0.048 | 0.738 | 0.877 | Full per-seed results in [`multi_seed_results.json`](./multi_seed_results.json). With only 30 test users per seed, single-seed accuracy varies materially (0.53–0.87 across seeds). **ROC-AUC 0.812 ± 0.048 is the more reliable performance estimate.** All 10 seeds yield all 3 tiers in the test fold thanks to stratification. ### Per-class F1 (seed 42) | Tier | Class share | XGBoost F1 | MLP F1 | |---|---:|---:|---:| | `low` | 57% | 0.727 | 0.647 | | `medium` | 23.5% | 0.286 | 0.400 | | `high` | 19.5% | **0.923** | 0.727 | The model performs best on `high` (the most behaviourally distinct tier — high failed-login rates, frequent impossible travel, elevated anomaly scores) and `low` (the majority class). The `medium` tier is hardest, which is the expected behaviour for a 3-tier ordinal task — mid-class samples sit between two boundaries and pick up confusion from both sides. ### Ablation: which feature groups matter | Configuration | Accuracy | Macro-F1 | Δ accuracy | |---|---:|---:|---:| | Full feature set (published) | 0.6667 | 0.6454 | — | | No user aggregates (count features) | 0.5333 | 0.4586 | **−0.1333** | | No risk scores | 0.5667 | 0.5300 | −0.1000 | | No engineered features | 0.5667 | 0.5444 | −0.1000 | | No session aggregates | 0.7000 | 0.6130 | +0.0333 | Findings: 1. **User-level count features matter most** (failed logins, lateral hops, MFA failures). Dropping them costs 13 pp accuracy. 2. **Risk scores and engineered features each contribute ~10 pp.** With only 139 training users, the trees can't fully recover engineered composites from raw inputs. 3. **Session aggregates slightly hurt accuracy** in seed 42 (gain 3 pp when dropped). With n=200, additional features can crowd the small data; the trees do better with fewer signals when each one is information-dense. Session aggregates are kept in the published pipeline because they help on most other seeds. ### Architecture **XGBoost:** multi-class gradient boosting (`multi:softprob`, 3 classes), `hist` tree method, class-balanced sample weights, early stopping on validation mlogloss. **MLP:** `34 → 128 → 64 → 3`, each hidden layer followed by `BatchNorm1d` → `ReLU` → `Dropout(0.3)`, weighted cross-entropy loss, AdamW optimizer, early stopping on validation macro-F1. Training hyperparameters are held internally by XpertSystems. ## Leakage diagnostic This is the most important section of the model card. The full diagnostic is in [`leakage_diagnostic.json`](./leakage_diagnostic.json). Summary: **Setup:** Train an XGBoost binary classifier to predict `threat_actor_capability_tier != 'none'` from per-session features. Use group-aware split by `user_id` (15% test = 30 disjoint users). Cumulatively drop suspected oracle feature groups and re-evaluate. | Configuration | n_features | Accuracy | ROC-AUC | |---|---:|---:|---:| | Full feature set | 166 | **1.0000** | **1.0000** | | − behavioural oracles (velocity, timestamp, credential count) | 163 | 0.9991 | 1.0000 | | − login_outcome | 154 | 0.9982 | 1.0000 | | − geo_country_code | 138 | 0.9987 | 1.0000 | | − device_trust_level | 133 | 0.9982 | 0.9999 | | − user_risk_tier | 130 | 0.9978 | 0.9996 | | − geo_anomaly_score | 129 | 0.9707 | 0.9897 | **Even after dropping six oracle feature groups (37 columns), the model still achieves 97% test accuracy and AUC 0.99.** The leakage is not localised to a few suspect features; it is distributed across the entire feature space because the synthetic generator produces threat-actor sessions that are anomalous on every dimension simultaneously, with no overlap into legitimate behaviour. ### Recommendation to dataset author For threat-actor detection to be a useful ML benchmark on this dataset, the next generator version should introduce **distributional overlap** between threat-actor and legitimate session populations across all anomaly indicators: - `velocity_anomaly_score`: extend non-actor distribution into [0.0, 0.5] and shrink actor to [0.3, 0.9] for substantial overlap in [0.3, 0.5] - `session_timestamp_utc`: interleave threat-actor and legitimate sessions across the same time window - `credential_attempt_count`: allow some non-actor users to exhibit elevated counts (mistyped passwords, MFA fatigue) - `login_outcome`: allow `failure_account_locked` and `success_anomalous` for some legitimate sessions - `geo_country_code`: include a baseline frequency of risky-country logins among legitimate users (business travel, contractors) - `device_trust_level`: allow threat actors to occasionally use compliant devices (token theft scenarios) Target operating regime: real-world detection AUC 0.7–0.9, not 1.0. ### What this means for buyers If you're evaluating CYB006 for a threat-detection product, you should know that: - **The sample dataset cannot be used to honestly benchmark threat-actor detection models.** A trivially regularised model will score 100%, which doesn't differentiate good detection systems from bad ones. - **The user-risk-tier task shipped in this baseline is a legitimate ML benchmark on the sample data.** It generalises modestly (AUC 0.81) and is the right starting point for evaluating insider-threat scoring on the sample. - **The full ~1.1M-row CYB006 product may or may not have the same structural property.** Confirm with XpertSystems before committing to a threat-detection use case. ## Limitations **This is a baseline reference, not a production identity-security system.** 1. **Small held-out test fold (n=30).** With only 30 test users per seed, single-seed metrics swing 0.53–0.87 in accuracy. The multi-seed ROC-AUC of 0.81 ± 0.05 is the reliable estimate. The full ~1.1M-row product would tighten the confidence interval substantially. 2. **The `medium` tier is harder than the others.** F1 0.29 on `medium` (vs 0.92 on `high`) is expected — ordinal middle classes are typically the hardest under a flat-classification setup. 3. **MLP weaker than XGBoost.** AUC 0.70 vs 0.80. With only 139 training users, the MLP cannot match boosted trees on tabular data. 4. **Threat-actor detection task is not usable on this sample.** See [Leakage diagnostic](#leakage-diagnostic) above. 5. **Synthetic-vs-real transfer.** The dataset is synthetic and calibrated to identity-security benchmarks (Microsoft Digital Defense Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories, Mandiant M-Trends, MITRE ATT&CK Evaluations). Real identity telemetry has different noise characteristics; do not assume metrics transfer. 6. **3 tiers, not 4.** README lists `low`/`medium`/`high`/`critical` but the data contains only 3. If you need 4-class support, wait for a regenerated sample. ## Notes on dataset schema The CYB006 sample dataset README describes some fields differently from the actual schema. The model was trained on the actual schema; this note helps buyers reconcile what they read with what they receive. | What the README says | What the data actually contains | |---|---| | `session_phase` has 6 values | **All 5,000 rows have `session_phase = session_termination`** — the field is constant. There is no usable session-phase target. | | `login_outcome` has 4 values (`success / failed / mfa_required / blocked`) | 9 values: `success_normal`, `failure_bad_password`, `failure_account_locked`, `failure_mfa_rejected`, `failure_device_untrusted`, `failure_geo_blocked`, `success_anomalous`, `account_takeover_confirmed`, `session_hijacked` | | 4 actor tiers | 5 values: 4 tier labels + `none` (92% of rows have `none`) | | `mfa_challenge_type` has 5 values | 7: adds `authenticator_app`, `hardware_token`, `voice_call` | | `authentication_method` has 4 values | 5: no `api_key`; adds `password_plus_mfa`, `phishing_resistant_fido2` | | `user_risk_tier` has 4 values (`low/medium/high/critical`) | 3 values: no `critical` | | `session_timestamp_utc` is an ISO timestamp string | It is an integer | | `user_risk_summary.csv` columns listed | Adds `peak_privilege_level_accessed`, `credential_attack_victim_flag` (not in README) | None of these affects model correctness — the feature pipeline uses the actual column names. If you build your own pipeline against the dataset, use the actual columns. ## Intended use - **Evaluating fit** of the CYB006 dataset for your insider-threat or user-risk-scoring research - **Baseline reference** for new model architectures - **Reference example of structural-leakage diagnostics** in synthetic cybersecurity datasets — the diagnostic methodology in `train_classifier.py` is reusable - **Feature engineering reference** for per-user identity aggregates ## Out-of-scope use - Production identity-security detection on real telemetry - Threat-actor attribution (this baseline does not address that task; see why above) - Any operational security or law-enforcement decision ## Reproducibility Outputs above were produced with `seed = 42` (published artifact), nested `StratifiedShuffleSplit` (70/15/15 by user_risk_tier), on the published sample (`xpertsystems/cyb006-sample`, version 1.0.0, generated 2026-05-16). The feature pipeline in `feature_engineering.py` is deterministic and the trained weights in this repo correspond exactly to the metrics above. Multi-seed results (seeds 42, 7, 13, 17, 23, 31, 45, 99, 123, 200) in `multi_seed_results.json` confirm robust performance across splits. The training script itself is private to XpertSystems. ## Files in this repo | File | Purpose | |---|---| | `model_xgb.json` | XGBoost weights (seed 42) | | `model_mlp.safetensors` | PyTorch MLP weights (seed 42) | | `feature_engineering.py` | Feature pipeline | | `feature_meta.json` | Feature column order + categorical levels | | `feature_scaler.json` | MLP input mean/std (XGBoost ignores) | | `validation_results.json` | Per-class metrics, confusion matrix, architecture | | `ablation_results.json` | Per-feature-group ablation | | `multi_seed_results.json` | XGBoost metrics across 10 seeds | | `leakage_diagnostic.json` | **Structural-leakage audit on threat-actor detection** | | `inference_example.ipynb` | End-to-end inference demo notebook | | `README.md` | This file | ## Contact and full product The full **CYB006** dataset contains ~1.1 million rows across four files, with 12 calibrated benchmark validation tests drawn from authoritative identity security and threat intelligence sources (Microsoft Digital Defense Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories, Mandiant M-Trends, MITRE ATT&CK Evaluations). The full XpertSystems.ai synthetic data catalogue spans 41 SKUs across Cybersecurity, Healthcare, Insurance & Risk, Oil & Gas, and Materials & Energy. - 📧 **pradeep@xpertsystems.ai** - 🌐 **https://xpertsystems.ai** - 🗂 Dataset: https://huggingface.co/datasets/xpertsystems/cyb006-sample - 🤖 Companion models: - https://huggingface.co/xpertsystems/cyb001-baseline-classifier (network traffic) - https://huggingface.co/xpertsystems/cyb002-baseline-classifier (ATT&CK kill-chain) - https://huggingface.co/xpertsystems/cyb003-baseline-classifier (malware execution phase) - https://huggingface.co/xpertsystems/cyb004-baseline-classifier (phishing campaign phase) - https://huggingface.co/xpertsystems/cyb005-baseline-classifier (ransomware actor-tier attribution) ## Citation ```bibtex @misc{xpertsystems_cyb006_baseline_2026, title = {CYB006 Baseline Classifier: XGBoost and MLP for User Risk Tier Classification, with Structural-Leakage Diagnostic on Threat-Actor Detection}, author = {XpertSystems.ai}, year = {2026}, url = {https://huggingface.co/xpertsystems/cyb006-baseline-classifier}, note = {Baseline reference model trained on xpertsystems/cyb006-sample} } ```