The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 10 new columns ({'application_id', 'risk_score_delta', 'session_id', 'user_id', 'event_id', 'source_domain_id', 'event_timestamp_utc', 'event_type', 'target_account_id', 'target_domain_id'}) and 21 missing columns ({'lateral_move_count', 'credential_harvest_count', 'attack_phase', 'actor_capability_tier', 'files_encrypted_cumulative', 'living_off_land_score', 'encryption_throughput_mbps', 'timestep', 'c2_bytes_exfiltrated', 'blast_radius_pct', 'wiper_flag', 'actor_id', 'attribution_risk_score', 'campaign_id', 'defender_alert_score', 'double_extortion_flag', 'ir_activated', 'data_exfiltrated_gb', 'detection_outcome', 'target_segment_id', 'endpoints_compromised'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb006-sample/auth_events.csv (at revision 74265056f8a3b53ce18934892c675bae83eb323f), [/tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
event_id: string
session_id: string
user_id: string
event_type: string
event_timestamp_utc: int64
target_account_id: string
source_domain_id: string
target_domain_id: string
application_id: string
risk_score_delta: double
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1527
to
{'campaign_id': Value('string'), 'actor_id': Value('string'), 'timestep': Value('int64'), 'attack_phase': Value('string'), 'files_encrypted_cumulative': Value('int64'), 'encryption_throughput_mbps': Value('float64'), 'endpoints_compromised': Value('int64'), 'lateral_move_count': Value('int64'), 'credential_harvest_count': Value('int64'), 'c2_bytes_exfiltrated': Value('float64'), 'defender_alert_score': Value('float64'), 'detection_outcome': Value('string'), 'blast_radius_pct': Value('float64'), 'actor_capability_tier': Value('string'), 'living_off_land_score': Value('float64'), 'attribution_risk_score': Value('float64'), 'data_exfiltrated_gb': Value('float64'), 'wiper_flag': Value('int64'), 'double_extortion_flag': Value('int64'), 'ir_activated': Value('int64'), 'target_segment_id': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 10 new columns ({'application_id', 'risk_score_delta', 'session_id', 'user_id', 'event_id', 'source_domain_id', 'event_timestamp_utc', 'event_type', 'target_account_id', 'target_domain_id'}) and 21 missing columns ({'lateral_move_count', 'credential_harvest_count', 'attack_phase', 'actor_capability_tier', 'files_encrypted_cumulative', 'living_off_land_score', 'encryption_throughput_mbps', 'timestep', 'c2_bytes_exfiltrated', 'blast_radius_pct', 'wiper_flag', 'actor_id', 'attribution_risk_score', 'campaign_id', 'defender_alert_score', 'double_extortion_flag', 'ir_activated', 'data_exfiltrated_gb', 'detection_outcome', 'target_segment_id', 'endpoints_compromised'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb006-sample/auth_events.csv (at revision 74265056f8a3b53ce18934892c675bae83eb323f), [/tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
campaign_id string | actor_id string | timestep int64 | attack_phase string | files_encrypted_cumulative int64 | encryption_throughput_mbps float64 | endpoints_compromised int64 | lateral_move_count int64 | credential_harvest_count int64 | c2_bytes_exfiltrated float64 | defender_alert_score float64 | detection_outcome string | blast_radius_pct float64 | actor_capability_tier string | living_off_land_score float64 | attribution_risk_score float64 | data_exfiltrated_gb float64 | wiper_flag int64 | double_extortion_flag int64 | ir_activated int64 | target_segment_id string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CAMP000001 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 80.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 860.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,129.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 3 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,588.6 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 4 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,829.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 5 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,967.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 6 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,060 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 7 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,185.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 8 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,215.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 9 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,322.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 10 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,409.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 11 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,777.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 12 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,982.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 13 | initial_access | 0 | 0 | 0 | 0 | 0 | 4,743 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 14 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,384.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 15 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,386.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 16 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,537.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 17 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,195.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 18 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,538.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 2 | 8,340.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 2 | 9,643.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,080 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,432.6 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 4 | 12,614 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,959.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 25 | internal_recon | 0 | 0 | 0 | 0 | 5 | 14,156.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 26 | internal_recon | 0 | 0 | 0 | 0 | 5 | 15,593.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 27 | internal_recon | 0 | 0 | 0 | 0 | 6 | 18,234 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 28 | internal_recon | 0 | 0 | 0 | 0 | 8 | 19,223.8 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 29 | lateral_movement | 0 | 0 | 26 | 26 | 8 | 19,527.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 30 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 19,920.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 31 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,125.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 32 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,454.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 33 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 21,585 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 34 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 1,290,617 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.269 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 35 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 3,071,483.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.781 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 36 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 5,235,916.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.164 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 37 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 7,624,645.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.389 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 38 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 11,849,588.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.225 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 39 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 16,271,996.5 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.422 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 40 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 20,946,279.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.674 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 41 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 26,330,570.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.384 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 42 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 31,816,805.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.486 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 43 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 38,550,569.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 6.734 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 44 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 46,025,779.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 7.475 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 45 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 54,424,915.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 8.399 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 46 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 63,527,322.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.102 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 47 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 73,025,307.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.498 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 48 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 82,715,529.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.69 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 49 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 92,808,046.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.093 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 50 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 103,106,807.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.299 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 51 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 114,069,495.7 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.963 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 52 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 125,890,241.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 11.821 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 53 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 139,177,576 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.287 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 54 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 55 | encryption_detonation | 7,578 | 47.168 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 56 | encryption_detonation | 17,061 | 39.663 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 57 | encryption_detonation | 27,646 | 38.245 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 58 | encryption_detonation | 38,343 | 54.313 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 59 | encryption_detonation | 51,724 | 71.346 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 60 | encryption_detonation | 67,233 | 38.242 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 61 | encryption_detonation | 74,277 | 23.686 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 62 | encryption_detonation | 82,497 | 71.044 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 63 | encryption_detonation | 92,220 | 66.385 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 64 | encryption_detonation | 103,087 | 45.441 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 65 | encryption_detonation | 107,574 | 41.642 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 66 | encryption_detonation | 116,518 | 45.118 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 67 | encryption_detonation | 122,575 | 62.676 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 68 | encryption_detonation | 132,445 | 31.488 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 69 | encryption_detonation | 139,708 | 46.891 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 70 | encryption_detonation | 148,655 | 71.752 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 71 | encryption_detonation | 155,159 | 67.565 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 72 | encryption_detonation | 162,027 | 51.052 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 73 | encryption_detonation | 167,757 | 58.26 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 74 | ransom_negotiation | 167,757 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | delayed_detection | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 1 | SEG00271 |
CAMP000002 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 127.1 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 356.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 992.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 3 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,037.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 4 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,923.8 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 5 | internal_recon | 0 | 0 | 0 | 0 | 1 | 1,973.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 6 | internal_recon | 0 | 0 | 0 | 0 | 2 | 3,242.2 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 7 | internal_recon | 0 | 0 | 0 | 0 | 3 | 5,509.4 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 8 | internal_recon | 0 | 0 | 0 | 0 | 3 | 7,645 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 9 | internal_recon | 0 | 0 | 0 | 0 | 3 | 8,945.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 10 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,307.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 11 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,495 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 12 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,096.8 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 13 | internal_recon | 0 | 0 | 0 | 0 | 6 | 12,225.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 14 | internal_recon | 0 | 0 | 0 | 0 | 9 | 12,744.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 15 | internal_recon | 0 | 0 | 0 | 0 | 9 | 13,776.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 16 | internal_recon | 0 | 0 | 0 | 0 | 9 | 14,379.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 17 | internal_recon | 0 | 0 | 0 | 0 | 10 | 16,023.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 18 | internal_recon | 0 | 0 | 0 | 0 | 12 | 17,247.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 13 | 19,435.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 14 | 20,814.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 16 | 21,450.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 18 | 22,031.7 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 19 | 23,034.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 21 | 23,061 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CYB006 — Synthetic Login Activity Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB006-SAMPLE · Version 1.0.0
This is a free preview of the full CYB006 — Synthetic Login Activity Dataset product. It contains roughly ~1.3% of the full dataset at identical schema, threat-actor-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
🤖 Trained baseline available: xpertsystems/cyb006-baseline-classifier — XGBoost + PyTorch MLP for 3-class user-risk-tier classification (insider-threat scoring use case), stratified split, multi-seed evaluation (ROC-AUC 0.812 ± 0.048). Includes a structural-leakage diagnostic on the threat-actor detection task that buyers planning ATO / threat-actor ML work should read first.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
identity_topology.csv |
~150 | ~3,200 | Identity domain registry |
user_risk_summary.csv |
~200 | ~6,500 | Per-user risk aggregates |
login_sessions.csv |
~5,000 | ~377,000 | Per-session login records (primary file) |
auth_events.csv |
~31,900 | ~750,000 | Discrete authentication event log |
Dataset Summary
CYB006 simulates enterprise login activity as a 6-phase session state machine across diverse identity infrastructures, with:
- 4 threat-actor capability tiers: script_kiddie, opportunistic, advanced_persistent_threat (APT), nation_state — with per-tier credential attack patterns, MFA bypass propensity, lateral hop distributions, and Golden Ticket / Pass-the-Hash abuse rates
- 8 identity domain types: on-premises AD, Azure AD, Okta, hybrid_joined, SAML federated, zero_trust_ztna, PAW (privileged access workstation), SaaS application portal — each with distinct detection_strength and resilience scores
- MFA challenge methods: disabled, SMS, TOTP, push notification, phishing-resistant FIDO2 — with per-method bypass propensity calibration
- 6 session lifecycle phases: pre_auth_probe, credential_submission, mfa_challenge, session_active, lateral_traversal, session_termination
- Geo-velocity modeling with impossible travel detection via Haversine distance and per-user expected geolocation baselines
- UEBA scoring with calibrated false-positive rates
- Conditional Access (CA) policy enforcement modeling — ZTNA block strength tunable per architecture
Trained Baseline Available
A working baseline classifier trained on this sample is published at xpertsystems/cyb006-baseline-classifier.
| Component | Detail |
|---|---|
| Primary task | 3-class user_risk_tier classification (insider-threat scoring) |
| Diagnostic | Audit of threat-actor detection on this sample (see leakage_diagnostic.json) |
| Models | XGBoost (model_xgb.json) + PyTorch MLP (model_mlp.safetensors) |
| Features | 34 per-user features (aggregates + non-leaky session aggregates + engineered) |
| Split | Stratified by user_risk_tier — user-level task, n=200 |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | inference_example.ipynb — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.700 ± 0.082, macro ROC-AUC 0.812 ± 0.048 (multi-seed) |
Important diagnostic finding for buyers planning threat-actor detection
work: the model card documents that this sample's threat-actor-vs-legitimate
session populations have non-overlapping anomaly score distributions
across at least six feature groups (velocity, timestamp, credential attempt
count, login outcome, geo country, device trust). As a result, a plain
XGBoost achieves 100% test accuracy on threat-actor binary detection that
does not reflect real-world detection difficulty. The baseline model
targets user_risk_tier instead, which is a legitimate ML task on the
sample. See the model card's Leakage diagnostic
section for the full audit and recommendations.
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from authoritative identity security sources (Microsoft Digital Defense Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories, Mandiant M-Trends, MITRE ATT&CK Evaluations, Gartner IAM Hype Cycle, KuppingerCole Leadership Compass).
Benchmark categories (calibrated in both sample and full product):
- Credential attack velocity — brute force (~50 RPS), password spray (<1 RPS)
- Account takeover rate by tier — graduated by attacker capability
- MFA bypass rate — FIDO2 ≤1%, push/SMS variable
- Impossible travel rate — 7-12% of sessions
- Lateral movement depth — capped per tier (script_kiddie ≤1.2 → nation_state ≤14)
- Privilege escalation rate — conditional on lateral movement
- MFA fatigue burst timing — Poisson λ=7 burst pattern
- UEBA false positive rate — calibrated to 10-14% range
- Golden Ticket / Pass-the-Hash detection gap — stealth modeling
- Session duration anomaly separation — KL divergence proxy
- Conditional Access block rate — ZTNA ≥88% for untrusted
- Kill-chain completion rate — phase-to-phase progression
Sample benchmark results:
| Test | Description | Verdict |
|---|---|---|
| T01 | Credential Attack Velocity | ✓ PASS |
| T02 | Account Takeover Rate by Tier | ✓ PASS |
| T03 | MFA Bypass Rate (FIDO2) | ✓ PASS |
| T04 | Impossible Travel Rate | ✓ PASS |
| T05 | Lateral Movement Depth by Tier | ✓ PASS |
| T06 | Privilege Escalation Rate | ✓ PASS |
| T07 | MFA Fatigue Burst Detection | ✓ PASS |
| T08 | UEBA False Positive Rate | ✓ PASS |
| T09 | Golden Ticket / PtH Detection Gap | ✓ PASS |
| T10 | Session Duration Anomaly Separation | ✓ PASS |
| T11 | Conditional Access Block Rate (ZTNA) | ✓ PASS |
| T12 | Kill-Chain Completion Rate | ✓ PASS |
Note: some benchmarks (e.g. nation-state account takeover rates, Golden Ticket detection) require larger sample sizes to converge tightly because they're conditional on small attacker-tier subsets (nation_state ≈ 2% of all sessions, APT ≈ 3%). The full product demonstrates all 12 benchmarks with strong statistical power.
Schema Highlights
login_sessions.csv (primary file)
| Column | Type | Description |
|---|---|---|
| session_id | string | Unique session identifier |
| user_id | string | User identifier (FK to user_risk_summary) |
| session_timestamp_utc | string | ISO timestamp |
| session_phase | string | 1 of 6 phases |
| login_outcome | string | success / failed / mfa_required / blocked |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| geo_country_code | string | ISO 3166 country code |
| geo_city_hash | string | Hashed city locator |
| device_id_hash | string | Hashed device fingerprint |
| device_trust_level | string | unknown / known / managed / compliant |
| authentication_method | string | password / sso / certificate / api_key |
| mfa_challenge_type | string | disabled / sms / totp / push / fido2 |
| mfa_response_latency_ms | int | MFA response latency |
| credential_attempt_count | int | Attempts before success |
| session_duration_seconds | int | Session length |
| target_application_id | string | Application accessed |
| privilege_level_accessed | string | standard / power_user / admin / domain_admin |
| user_risk_tier | string | low / medium / high / critical |
| threat_actor_capability_tier | string | script_kiddie / opportunistic / apt / nation_state (target) |
| geo_anomaly_score | float | Geographic anomaly score (0–1) |
| velocity_anomaly_score | float | Login velocity anomaly score (0–1) |
| impossible_travel_flag | int | Boolean — impossible travel detected |
user_risk_summary.csv (per-user aggregates)
| Column | Type | Description |
|---|---|---|
| user_id | string | User identifier |
| user_risk_tier | string | Risk tier classification target |
| total_login_attempts | int | Total login attempts in window |
| successful_logins | int | Successful logins |
| failed_logins | int | Failed logins |
| mfa_failures | int | MFA challenge failures |
| impossible_travel_events | int | Count of impossible travel detections |
| lateral_hop_count | int | Total lateral movement hops |
| privilege_escalations | int | Privilege escalation count |
| account_lockout_count | int | Account lockout events |
| geo_dispersion_score | float | Geographic dispersion (0–1) |
| login_velocity_score | float | Velocity anomaly (0–1) |
| session_anomaly_rate | float | Fraction of anomalous sessions |
| ueba_alert_count | int | UEBA alerts raised |
| threat_actor_flag | int | Boolean — threat actor |
| account_takeover_flag | int | Boolean — account takeover detected |
| overall_identity_risk_score | float | Composite identity risk (0–1) |
| insider_threat_indicator_score | float | Insider threat composite (0–1) |
See auth_events.csv and identity_topology.csv for the event log and
identity domain schemas respectively.
Suggested Use Cases
- Training insider threat scoring models — worked example available
- Account takeover (ATO) detection model development (see leakage diagnostic in the baseline model card before training)
- Threat-actor tier classification — 4-class with realistic class imbalance (see leakage diagnostic before training)
- Impossible travel detection — geo-velocity feature engineering
- MFA bypass detection — distinguish FIDO2 anomalies from push fatigue
- Lateral movement detection — session-graph traversal patterns
- Golden Ticket / Pass-the-Hash detection benchmarking
- UEBA precision/recall tuning with calibrated false-positive baselines
- Conditional Access policy effectiveness simulation
- Zero Trust posture validation — ZTNA block rate analysis
Loading the Data
import pandas as pd
sessions = pd.read_csv("login_sessions.csv")
users = pd.read_csv("user_risk_summary.csv")
events = pd.read_csv("auth_events.csv")
domains = pd.read_csv("identity_topology.csv")
# Join session data with user-level risk labels
enriched = sessions.merge(users, on="user_id", how="left",
suffixes=("", "_user"))
# Threat-actor tier classification target (4-class) — see leakage diagnostic
y_tier = sessions["threat_actor_capability_tier"]
# Binary account-takeover detection target
y_ato = users["account_takeover_flag"]
# Binary impossible-travel target
y_it = sessions["impossible_travel_flag"]
For a worked end-to-end example with user-risk-tier classification, stratified splitting, and feature engineering, see the inference notebook in the baseline classifier repo.
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB006 dataset includes ~1.1 million rows across all four files, with 12 calibrated benchmark validation tests drawn from authoritative identity security and threat intelligence sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb006_sample_2026,
title = {CYB006: Synthetic Login Activity Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb006-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:13:20 UTC
- Session model : 6-phase login lifecycle state machine
- Benchmark tests : 12/12 passing
- Downloads last month
- 32