Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 14 new columns ({'siem_platform', 'criticality_rating', 'ip_address', 'host_role', 'network_segment', 'os_type', 'patch_compliance_level', 'hostname', 'os_version', 'defender_posture_tier', 'cloud_region', 'cloud_provider', 'edr_agent_installed', 'vulnerability_count_open'}) and 20 missing columns ({'alert_rule_id', 'time_to_detect_seconds', 'user_id', 'analyst_triage_priority', 'timestamp', 'alert_category', 'suppressed_flag', 'label_true_positive', 'label_false_positive', 'alert_rule_name', 'correlated_chain_length', 'threat_actor_id', 'severity_level', 'mitre_technique_id', 'mitre_tactic', 'suppression_reason', 'correlated_event_ids', 'siem_platform_type', 'incident_id', 'alert_id'}).

This happened while the csv dataset builder was generating data using

hf://datasets/xpertsystems/cyb010-sample/host_inventory.csv (at revision 1a74c11944fa2b06df38454b860cc561f6e9a35f), [/tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv)]

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
                  self._write_table(pa_table, writer_batch_size=writer_batch_size)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              host_id: string
              hostname: string
              ip_address: string
              os_type: string
              os_version: string
              host_role: string
              network_segment: string
              defender_posture_tier: string
              edr_agent_installed: bool
              patch_compliance_level: double
              criticality_rating: string
              cloud_provider: string
              cloud_region: string
              vulnerability_count_open: int64
              siem_platform: string
              -- schema metadata --
              pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 2172
              to
              {'alert_id': Value('string'), 'timestamp': Value('string'), 'correlated_event_ids': Value('string'), 'alert_rule_id': Value('string'), 'alert_rule_name': Value('string'), 'host_id': Value('string'), 'user_id': Value('string'), 'threat_actor_id': Value('string'), 'severity_level': Value('string'), 'alert_category': Value('string'), 'mitre_technique_id': Value('string'), 'mitre_tactic': Value('string'), 'label_true_positive': Value('bool'), 'label_false_positive': Value('bool'), 'analyst_triage_priority': Value('string'), 'suppressed_flag': Value('bool'), 'suppression_reason': Value('string'), 'time_to_detect_seconds': Value('float64'), 'siem_platform_type': Value('string'), 'correlated_chain_length': Value('int64'), 'incident_id': Value('string')}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
                  builder.download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
                  self._download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 14 new columns ({'siem_platform', 'criticality_rating', 'ip_address', 'host_role', 'network_segment', 'os_type', 'patch_compliance_level', 'hostname', 'os_version', 'defender_posture_tier', 'cloud_region', 'cloud_provider', 'edr_agent_installed', 'vulnerability_count_open'}) and 20 missing columns ({'alert_rule_id', 'time_to_detect_seconds', 'user_id', 'analyst_triage_priority', 'timestamp', 'alert_category', 'suppressed_flag', 'label_true_positive', 'label_false_positive', 'alert_rule_name', 'correlated_chain_length', 'threat_actor_id', 'severity_level', 'mitre_technique_id', 'mitre_tactic', 'suppression_reason', 'correlated_event_ids', 'siem_platform_type', 'incident_id', 'alert_id'}).
              
              This happened while the csv dataset builder was generating data using
              
              hf://datasets/xpertsystems/cyb010-sample/host_inventory.csv (at revision 1a74c11944fa2b06df38454b860cc561f6e9a35f), [/tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv)]
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

alert_id
string
timestamp
string
correlated_event_ids
string
alert_rule_id
string
alert_rule_name
string
host_id
string
user_id
string
threat_actor_id
string
severity_level
string
alert_category
string
mitre_technique_id
string
mitre_tactic
string
label_true_positive
bool
label_false_positive
bool
analyst_triage_priority
string
suppressed_flag
bool
suppression_reason
string
time_to_detect_seconds
float64
siem_platform_type
string
correlated_chain_length
int64
incident_id
string
ALT-0000000001
2024-07-22T04:15:58.879047+00:00
EVT-0000000049
RULE-6718
Persistence Mechanism
HOST-00352
USR-03415
ACTOR-0001
informational
persistence_mechanism
T1592
Reconnaissance
true
false
P4
false
null
37,756.3
splunk
2
INC-0000001
ALT-0000000002
2024-07-22T21:55:40.046569+00:00
EVT-0000000050
RULE-1163
Insider Threat Indicator
HOST-00352
USR-04082
ACTOR-0001
high
insider_threat_indicator
T1003
Credential Access
true
false
P2
false
null
87,374
splunk
1
INC-0000001
ALT-0000000003
2024-07-20T18:45:24.189759+00:00
null
RULE-6545
False Positive Noise
HOST-00352
USR-00511
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
auto_closed_low_fidelity
0
splunk
1
INC-0000001
ALT-0000000004
2024-07-20T15:18:02.401523+00:00
null
RULE-1149
False Positive Noise
HOST-00352
USR-04928
NONE
low
false_positive_noise
T0000
benign
false
true
P4
false
analyst_dismissed
0
splunk
1
INC-0000001
ALT-0000000005
2024-07-19T06:04:46.852497+00:00
null
RULE-8006
False Positive Noise
HOST-00352
USR-02137
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
analyst_dismissed
0
splunk
1
INC-0000001
ALT-0000000006
2024-07-21T03:44:19.745498+00:00
null
RULE-3486
False Positive Noise
HOST-00352
USR-02016
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
splunk
1
INC-0000001
ALT-0000000007
2024-11-25T04:44:36.282470+00:00
null
RULE-9926
False Positive Noise
HOST-00043
USR-01348
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
rate_limit_throttle
0
aws_security_hub
1
INC-0000002
ALT-0000000008
2024-11-25T04:52:20.633838+00:00
null
RULE-4439
False Positive Noise
HOST-00043
USR-04984
NONE
medium
false_positive_noise
T0000
benign
false
true
P4
false
analyst_dismissed
0
aws_security_hub
1
INC-0000002
ALT-0000000009
2024-05-16T15:05:21.021861+00:00
EVT-0000000104
RULE-5383
Insider Threat Indicator
HOST-00010
USR-03597
ACTOR-0001
high
insider_threat_indicator
T1195
Initial Access
true
false
P3
true
rate_limit_throttle
174,498.2
arcsight_esm
1
INC-0000003
ALT-0000000010
2024-05-16T11:57:56.530298+00:00
EVT-0000000106
RULE-1328
Policy Violation
HOST-00010
USR-00638
ACTOR-0001
high
policy_violation
T1595
Reconnaissance
true
false
P3
true
auto_closed_low_fidelity
174,787
arcsight_esm
3
INC-0000003
ALT-0000000011
2024-05-16T12:47:09.238924+00:00
EVT-0000000107
RULE-5163
Policy Violation
HOST-00010
USR-01172
ACTOR-0001
medium
policy_violation
T1110
Credential Access
true
false
P3
true
tuning_whitelist
82,656.9
arcsight_esm
1
INC-0000003
ALT-0000000012
2024-05-16T12:47:09.238924+00:00
EVT-0000000107
RULE-4961
False Positive Noise
HOST-00010
USR-00223
NONE
medium
false_positive_noise
T0000
benign
false
true
P4
false
duplicate_correlation
0
arcsight_esm
1
INC-0000003
ALT-0000000013
2024-05-16T04:41:13.260536+00:00
EVT-0000000108
RULE-4018
Policy Violation
HOST-00010
USR-03627
ACTOR-0001
medium
policy_violation
T1590
Reconnaissance
true
false
P3
true
auto_closed_low_fidelity
128,286.4
arcsight_esm
2
INC-0000003
ALT-0000000014
2024-05-16T14:54:45.028999+00:00
EVT-0000000109
RULE-3550
C2 Beacon Pattern
HOST-00010
USR-03404
ACTOR-0001
critical
c2_beacon_pattern
T1592
Reconnaissance
true
false
P3
false
null
13,098.8
arcsight_esm
1
INC-0000003
ALT-0000000015
2024-05-16T23:18:05.065137+00:00
EVT-0000000110
RULE-9039
Dns Tunnelling Indicator
HOST-00010
USR-03426
ACTOR-0001
low
dns_tunnelling_indicator
T1590
Reconnaissance
true
false
P3
false
null
96,956.9
arcsight_esm
9
INC-0000003
ALT-0000000016
2024-05-16T13:25:11.273443+00:00
null
RULE-6628
False Positive Noise
HOST-00010
USR-01119
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
tuning_whitelist
0
arcsight_esm
1
INC-0000003
ALT-0000000017
2024-05-16T13:35:52.413631+00:00
null
RULE-7011
False Positive Noise
HOST-00010
USR-02066
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
duplicate_correlation
0
arcsight_esm
1
INC-0000003
ALT-0000000018
2024-05-16T13:19:49.889198+00:00
null
RULE-6615
False Positive Noise
HOST-00010
USR-00229
NONE
medium
false_positive_noise
T0000
benign
false
true
P4
false
tuning_whitelist
0
arcsight_esm
1
INC-0000003
ALT-0000000019
2024-04-20T20:46:29.729216+00:00
EVT-0000000154
RULE-5953
Dns Tunnelling Indicator
HOST-00208
USR-00135
ACTOR-0001
medium
dns_tunnelling_indicator
T1078
Initial Access
true
false
P4
true
tuning_whitelist
574,001.5
splunk
5
INC-0000004
ALT-0000000020
2024-03-31T09:19:22.911907+00:00
EVT-0000000155
RULE-6141
Lateral Movement Detected
HOST-00208
USR-03551
ACTOR-0001
low
lateral_movement_detected
T1190
Initial Access
true
false
P4
false
null
168,991.3
splunk
10
INC-0000004
ALT-0000000021
2024-04-04T20:27:41.215905+00:00
EVT-0000000156
RULE-3339
Policy Violation
HOST-00208
USR-01403
ACTOR-0001
low
policy_violation
T1003
Credential Access
true
false
P3
false
null
158,940
splunk
1
INC-0000004
ALT-0000000022
2024-04-11T00:26:48.332270+00:00
EVT-0000000157
RULE-1310
Data Exfiltration Indicator
HOST-00208
USR-03726
ACTOR-0001
medium
data_exfiltration_indicator
T1055
Privilege Escalation
true
false
P3
false
null
245,444.1
splunk
1
INC-0000004
ALT-0000000023
2024-05-08T22:10:48.813533+00:00
EVT-0000000158
RULE-9319
Anomalous Cloud Activity
HOST-00208
USR-03185
ACTOR-0001
high
anomalous_cloud_activity
T1003
Credential Access
true
false
P2
true
tuning_whitelist
1,111,874
splunk
2
INC-0000004
ALT-0000000024
2024-04-21T08:12:08.908518+00:00
EVT-0000000159
RULE-3452
C2 Beacon Pattern
HOST-00208
USR-01897
ACTOR-0001
high
c2_beacon_pattern
T1021
Lateral Movement
true
false
P4
false
null
479,197.3
splunk
5
INC-0000004
ALT-0000000025
2024-02-04T10:00:40.115582+00:00
EVT-0000000261
RULE-9846
Insider Threat Indicator
HOST-00156
USR-00324
ACTOR-0001
low
insider_threat_indicator
T1190
Initial Access
true
false
P4
false
null
547,930.6
splunk
1
INC-0000005
ALT-0000000026
2024-02-04T10:00:40.115582+00:00
EVT-0000000261
RULE-6837
False Positive Noise
HOST-00156
USR-00136
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
analyst_dismissed
0
splunk
1
INC-0000005
ALT-0000000027
2024-02-11T12:24:05.729468+00:00
EVT-0000000262
RULE-8864
Brute Force Attempt
HOST-00156
USR-04316
ACTOR-0001
medium
brute_force_attempt
T1534
Lateral Movement
true
false
P4
false
null
88,514.5
splunk
1
INC-0000005
ALT-0000000028
2024-02-13T02:52:01.076184+00:00
EVT-0000000263
RULE-3562
Persistence Mechanism
HOST-00156
USR-03021
ACTOR-0001
high
persistence_mechanism
T1558
Credential Access
true
false
P4
false
null
457,338.2
splunk
1
INC-0000005
ALT-0000000029
2024-02-13T02:52:01.076184+00:00
EVT-0000000263
RULE-4295
False Positive Noise
HOST-00156
USR-04169
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
analyst_dismissed
0
splunk
1
INC-0000005
ALT-0000000030
2024-02-12T22:10:13.024235+00:00
EVT-0000000264
RULE-6327
Anomalous Cloud Activity
HOST-00156
USR-01023
ACTOR-0001
medium
anomalous_cloud_activity
T1562
Defense Evasion
true
false
P3
false
null
186,522
splunk
2
INC-0000005
ALT-0000000031
2024-02-09T10:48:00.370758+00:00
EVT-0000000265
RULE-6787
Dns Tunnelling Indicator
HOST-00156
USR-00413
ACTOR-0001
informational
dns_tunnelling_indicator
T1070
Defense Evasion
true
false
P4
true
duplicate_correlation
814,083.8
splunk
7
INC-0000005
ALT-0000000032
2024-02-09T20:57:16.174551+00:00
EVT-0000000266
RULE-3145
Privilege Escalation
HOST-00156
USR-02181
ACTOR-0001
critical
privilege_escalation
T1027
Defense Evasion
true
false
P2
false
null
190,810.6
splunk
1
INC-0000005
ALT-0000000033
2024-02-07T05:48:28.827678+00:00
EVT-0000000267
RULE-7366
Lateral Movement Detected
HOST-00156
USR-01056
ACTOR-0001
critical
lateral_movement_detected
T1027
Defense Evasion
true
false
P4
false
null
698,881.4
splunk
4
INC-0000005
ALT-0000000034
2024-02-12T14:30:12.795594+00:00
EVT-0000000268
RULE-1515
Persistence Mechanism
HOST-00156
USR-02271
ACTOR-0001
high
persistence_mechanism
T1570
Lateral Movement
true
false
P3
true
analyst_dismissed
265,464.6
splunk
1
INC-0000005
ALT-0000000035
2024-02-13T12:43:03.074736+00:00
EVT-0000000269
RULE-9218
Credential Stuffing
HOST-00156
USR-01476
ACTOR-0001
low
credential_stuffing
T1070
Defense Evasion
true
false
P3
false
null
148,385.2
splunk
6
INC-0000005
ALT-0000000036
2024-02-08T22:23:35.072602+00:00
EVT-0000000270
RULE-7233
Dns Tunnelling Indicator
HOST-00156
USR-00355
ACTOR-0001
medium
dns_tunnelling_indicator
T1558
Credential Access
true
false
P4
false
null
480,809.5
splunk
11
INC-0000005
ALT-0000000037
2024-02-22T22:17:50.061427+00:00
EVT-0000000271
RULE-5541
Waf Attack Pattern
HOST-00156
USR-03367
ACTOR-0001
medium
waf_attack_pattern
T1136
Persistence
true
false
P4
false
null
64,295.3
splunk
1
INC-0000005
ALT-0000000038
2024-02-19T00:41:11.771439+00:00
EVT-0000000273
RULE-1517
Dns Tunnelling Indicator
HOST-00156
USR-02240
ACTOR-0001
critical
dns_tunnelling_indicator
T1218
Defense Evasion
true
false
P2
true
duplicate_correlation
394,457.5
splunk
1
INC-0000005
ALT-0000000039
2024-02-19T00:41:11.771439+00:00
EVT-0000000273
RULE-7621
False Positive Noise
HOST-00156
USR-04242
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
duplicate_correlation
0
splunk
1
INC-0000005
ALT-0000000040
2024-02-22T01:34:29.324413+00:00
EVT-0000000274
RULE-8614
Policy Violation
HOST-00156
USR-00435
ACTOR-0001
low
policy_violation
T1547
Persistence
true
false
P4
false
null
903.2
splunk
1
INC-0000005
ALT-0000000041
2024-02-18T22:55:34.814303+00:00
EVT-0000000275
RULE-3158
Credential Stuffing
HOST-00156
USR-04783
ACTOR-0001
medium
credential_stuffing
T1548
Privilege Escalation
true
false
P4
true
rate_limit_throttle
390,250.9
splunk
8
INC-0000005
ALT-0000000042
2024-02-18T22:55:34.814303+00:00
EVT-0000000275
RULE-3888
False Positive Noise
HOST-00156
USR-04896
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
analyst_dismissed
0
splunk
1
INC-0000005
ALT-0000000043
2024-03-03T02:11:30.035331+00:00
EVT-0000000279
RULE-4405
Data Exfiltration Indicator
HOST-00156
USR-00068
ACTOR-0001
high
data_exfiltration_indicator
T1572
Command and Control
true
false
P2
true
tuning_whitelist
915,468.6
splunk
6
INC-0000005
ALT-0000000044
2024-02-26T03:34:59.978087+00:00
EVT-0000000280
RULE-2821
Insider Threat Indicator
HOST-00156
USR-01776
ACTOR-0001
medium
insider_threat_indicator
T1074
Collection
true
false
P4
true
rate_limit_throttle
82,060.8
splunk
2
INC-0000005
ALT-0000000045
2024-03-02T01:33:37.113452+00:00
EVT-0000000281
RULE-2818
C2 Beacon Pattern
HOST-00156
USR-02975
ACTOR-0001
medium
c2_beacon_pattern
T1105
Command and Control
true
false
P3
true
analyst_dismissed
303,850.5
splunk
3
INC-0000005
ALT-0000000046
2024-02-27T03:58:11.643224+00:00
EVT-0000000282
RULE-8146
Privilege Escalation
HOST-00156
USR-02314
ACTOR-0001
critical
privilege_escalation
T1567
Exfiltration
true
false
P1
false
null
682,426.3
splunk
3
INC-0000005
ALT-0000000047
2024-03-04T01:41:52.027994+00:00
EVT-0000000283
RULE-1604
C2 Beacon Pattern
HOST-00156
USR-02232
ACTOR-0001
medium
c2_beacon_pattern
T1114
Collection
true
false
P3
false
null
1,140,272.9
splunk
6
INC-0000005
ALT-0000000048
2024-03-04T02:04:38.640080+00:00
null
RULE-6085
False Positive Noise
HOST-00156
USR-00051
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
tuning_whitelist
0
splunk
1
INC-0000005
ALT-0000000049
2024-02-04T21:23:12.356010+00:00
null
RULE-4360
False Positive Noise
HOST-00156
USR-04343
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
analyst_dismissed
0
splunk
1
INC-0000005
ALT-0000000050
2024-03-04T08:48:53.980147+00:00
null
RULE-6962
False Positive Noise
HOST-00156
USR-03212
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
splunk
1
INC-0000005
ALT-0000000051
2024-02-28T06:33:20.709017+00:00
null
RULE-1996
False Positive Noise
HOST-00156
USR-03954
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
tuning_whitelist
0
splunk
1
INC-0000005
ALT-0000000052
2024-01-29T22:57:26.418298+00:00
null
RULE-4319
False Positive Noise
HOST-00156
USR-02992
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
auto_closed_low_fidelity
0
splunk
1
INC-0000005
ALT-0000000053
2024-02-27T23:23:57.387644+00:00
null
RULE-6467
False Positive Noise
HOST-00156
USR-03210
NONE
medium
false_positive_noise
T0000
benign
false
true
P4
false
rate_limit_throttle
0
splunk
1
INC-0000005
ALT-0000000054
2024-02-08T20:34:17.980473+00:00
null
RULE-6633
False Positive Noise
HOST-00156
USR-01848
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
duplicate_correlation
0
splunk
1
INC-0000005
ALT-0000000055
2024-07-25T04:00:33.838604+00:00
EVT-0000000386
RULE-3020
Anomalous Cloud Activity
HOST-00097
USR-00410
ACTOR-0001
low
anomalous_cloud_activity
T1590
Reconnaissance
true
false
P2
false
null
137,931
palo_alto_xsiam
4
INC-0000006
ALT-0000000056
2024-07-24T22:10:00.368869+00:00
EVT-0000000387
RULE-4478
Anomalous Cloud Activity
HOST-00097
USR-02820
ACTOR-0001
high
anomalous_cloud_activity
T1590
Reconnaissance
true
false
P2
false
null
53,320.7
palo_alto_xsiam
2
INC-0000006
ALT-0000000057
2024-07-23T23:33:30.683763+00:00
EVT-0000000388
RULE-8366
Persistence Mechanism
HOST-00097
USR-04224
ACTOR-0001
critical
persistence_mechanism
T1589
Reconnaissance
true
false
P3
false
null
603,396.9
palo_alto_xsiam
1
INC-0000006
ALT-0000000058
2024-07-21T20:38:15.630013+00:00
EVT-0000000389
RULE-5017
Privilege Escalation
HOST-00097
USR-01512
ACTOR-0001
medium
privilege_escalation
T1190
Initial Access
true
false
P3
true
auto_closed_low_fidelity
192,628.6
palo_alto_xsiam
3
INC-0000006
ALT-0000000059
2024-07-13T22:15:36.358947+00:00
EVT-0000000390
RULE-8073
Credential Stuffing
HOST-00097
USR-00916
ACTOR-0001
high
credential_stuffing
T1592
Reconnaissance
true
false
P2
true
rate_limit_throttle
408,244.7
palo_alto_xsiam
1
INC-0000006
ALT-0000000060
2024-07-12T21:37:39.442758+00:00
EVT-0000000391
RULE-2648
Privilege Escalation
HOST-00097
USR-02927
ACTOR-0001
low
privilege_escalation
T1589
Reconnaissance
true
false
P3
true
duplicate_correlation
208,328.4
palo_alto_xsiam
2
INC-0000006
ALT-0000000061
2024-07-16T01:04:21.835939+00:00
EVT-0000000392
RULE-5073
Lateral Movement Detected
HOST-00097
USR-01210
ACTOR-0001
medium
lateral_movement_detected
T1195
Initial Access
true
false
P4
false
null
62,678.7
palo_alto_xsiam
4
INC-0000006
ALT-0000000062
2024-09-15T23:15:23.100184+00:00
EVT-0000000393
RULE-7505
Insider Threat Indicator
HOST-00097
USR-01458
ACTOR-0001
low
insider_threat_indicator
T1016
Discovery
true
false
P3
false
null
769,667.3
palo_alto_xsiam
3
INC-0000006
ALT-0000000063
2024-08-21T17:43:29.487820+00:00
EVT-0000000394
RULE-5742
Lateral Movement Detected
HOST-00097
USR-04246
ACTOR-0001
critical
lateral_movement_detected
T1555
Credential Access
true
false
P3
false
null
230,131.1
palo_alto_xsiam
5
INC-0000006
ALT-0000000064
2024-08-17T23:31:27.992471+00:00
EVT-0000000395
RULE-9443
Dns Tunnelling Indicator
HOST-00097
USR-03451
ACTOR-0001
low
dns_tunnelling_indicator
T1016
Discovery
true
false
P4
true
rate_limit_throttle
1,028,831.5
palo_alto_xsiam
7
INC-0000006
ALT-0000000065
2024-09-03T01:47:43.434878+00:00
EVT-0000000396
RULE-5782
Malware Execution
HOST-00097
USR-04539
ACTOR-0001
high
malware_execution
T1070
Defense Evasion
true
false
P2
false
null
324,901.4
palo_alto_xsiam
2
INC-0000006
ALT-0000000066
2024-09-01T05:52:15.500451+00:00
EVT-0000000397
RULE-7479
Threat Intel Ioc Match
HOST-00097
USR-04396
ACTOR-0001
low
threat_intel_ioc_match
T1016
Discovery
true
false
P4
true
analyst_dismissed
218,952.8
palo_alto_xsiam
1
INC-0000006
ALT-0000000067
2024-08-19T05:37:36.600256+00:00
EVT-0000000399
RULE-6028
Malware Execution
HOST-00097
USR-04024
ACTOR-0001
high
malware_execution
T1016
Discovery
true
false
P4
false
null
114,671.1
palo_alto_xsiam
1
INC-0000006
ALT-0000000068
2024-09-29T05:29:57.721956+00:00
EVT-0000000400
RULE-6736
Waf Attack Pattern
HOST-00097
USR-03543
ACTOR-0001
high
waf_attack_pattern
T1068
Privilege Escalation
true
false
P2
false
null
173,539.2
palo_alto_xsiam
9
INC-0000006
ALT-0000000069
2024-09-18T08:23:12.100934+00:00
EVT-0000000401
RULE-7750
Anomalous Cloud Activity
HOST-00097
USR-02125
ACTOR-0001
critical
anomalous_cloud_activity
T1027
Defense Evasion
true
false
P3
false
null
72,326.4
palo_alto_xsiam
11
INC-0000006
ALT-0000000070
2024-10-22T00:20:11.059250+00:00
EVT-0000000402
RULE-3941
Insider Threat Indicator
HOST-00097
USR-00510
ACTOR-0001
medium
insider_threat_indicator
T1134
Privilege Escalation
true
false
P4
true
rate_limit_throttle
1,044,622.7
palo_alto_xsiam
2
INC-0000006
ALT-0000000071
2024-10-22T00:20:11.059250+00:00
EVT-0000000402
RULE-5626
False Positive Noise
HOST-00097
USR-00618
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
rate_limit_throttle
0
palo_alto_xsiam
1
INC-0000006
ALT-0000000072
2024-11-12T23:48:03.297976+00:00
EVT-0000000403
RULE-8476
Threat Intel Ioc Match
HOST-00097
USR-03506
ACTOR-0001
medium
threat_intel_ioc_match
T1095
Command and Control
true
false
P4
false
null
340,486
palo_alto_xsiam
1
INC-0000006
ALT-0000000073
2024-11-03T22:13:57.443204+00:00
EVT-0000000404
RULE-9810
Anomalous Cloud Activity
HOST-00097
USR-03227
ACTOR-0001
high
anomalous_cloud_activity
T1560
Collection
true
false
P4
true
auto_closed_low_fidelity
18,990
palo_alto_xsiam
5
INC-0000006
ALT-0000000074
2024-11-09T11:05:47.852310+00:00
EVT-0000000405
RULE-3815
Malware Execution
HOST-00097
USR-04969
ACTOR-0001
high
malware_execution
T1071
Command and Control
true
false
P1
true
auto_closed_low_fidelity
162,296.9
palo_alto_xsiam
1
INC-0000006
ALT-0000000075
2024-10-22T19:04:47.397336+00:00
null
RULE-8430
False Positive Noise
HOST-00097
USR-03242
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
tuning_whitelist
0
palo_alto_xsiam
1
INC-0000006
ALT-0000000076
2024-07-15T20:03:57.913813+00:00
null
RULE-4150
False Positive Noise
HOST-00097
USR-03225
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
palo_alto_xsiam
1
INC-0000006
ALT-0000000077
2024-08-07T22:07:11.523453+00:00
null
RULE-8394
False Positive Noise
HOST-00097
USR-02607
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
rate_limit_throttle
0
palo_alto_xsiam
1
INC-0000006
ALT-0000000078
2024-09-09T19:53:42.853274+00:00
null
RULE-3956
False Positive Noise
HOST-00097
USR-01201
NONE
low
false_positive_noise
T0000
benign
false
true
P4
false
analyst_dismissed
0
palo_alto_xsiam
1
INC-0000006
ALT-0000000079
2024-08-04T13:48:34.787387+00:00
null
RULE-8085
False Positive Noise
HOST-00172
USR-04214
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
duplicate_correlation
0
microsoft_sentinel
1
INC-0000007
ALT-0000000080
2024-08-04T15:11:52.732248+00:00
null
RULE-9677
False Positive Noise
HOST-00172
USR-00025
NONE
low
false_positive_noise
T0000
benign
false
true
P4
false
duplicate_correlation
0
microsoft_sentinel
1
INC-0000007
ALT-0000000081
2024-08-04T14:13:45.295599+00:00
null
RULE-9203
False Positive Noise
HOST-00172
USR-00236
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
microsoft_sentinel
1
INC-0000007
ALT-0000000082
2024-08-04T13:09:45.953548+00:00
null
RULE-5079
False Positive Noise
HOST-00172
USR-01984
NONE
low
false_positive_noise
T0000
benign
false
true
P4
false
analyst_dismissed
0
microsoft_sentinel
1
INC-0000007
ALT-0000000083
2024-08-04T13:01:51.315291+00:00
null
RULE-7004
False Positive Noise
HOST-00172
USR-00909
NONE
low
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
microsoft_sentinel
1
INC-0000007
ALT-0000000084
2024-08-04T12:29:55.986033+00:00
null
RULE-3218
False Positive Noise
HOST-00172
USR-04397
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
duplicate_correlation
0
microsoft_sentinel
1
INC-0000007
ALT-0000000085
2024-08-19T01:40:34.335328+00:00
EVT-0000000542
RULE-8168
Insider Threat Indicator
HOST-00106
USR-02274
ACTOR-0001
low
insider_threat_indicator
T1133
Initial Access
true
false
P4
false
null
454,113.7
google_chronicle
2
INC-0000008
ALT-0000000086
2024-08-19T14:20:15.316792+00:00
EVT-0000000543
RULE-3005
Persistence Mechanism
HOST-00106
USR-00480
ACTOR-0001
informational
persistence_mechanism
T1555
Credential Access
true
false
P4
true
duplicate_correlation
1,179,691.1
google_chronicle
9
INC-0000008
ALT-0000000087
2024-08-19T23:12:57.470637+00:00
EVT-0000000544
RULE-5564
Privilege Escalation
HOST-00106
USR-03513
ACTOR-0001
medium
privilege_escalation
T1078
Initial Access
true
false
P2
false
null
337,721.3
google_chronicle
1
INC-0000008
ALT-0000000088
2024-08-19T22:52:16.210696+00:00
EVT-0000000545
RULE-6660
Waf Attack Pattern
HOST-00106
USR-00819
ACTOR-0001
low
waf_attack_pattern
T1555
Credential Access
true
false
P4
false
null
1,174,470
google_chronicle
3
INC-0000008
ALT-0000000089
2024-08-19T12:26:01.330625+00:00
EVT-0000000546
RULE-2501
Anomalous Cloud Activity
HOST-00106
USR-04219
ACTOR-0001
low
anomalous_cloud_activity
T1190
Initial Access
true
false
P3
false
null
53,769.5
google_chronicle
1
INC-0000008
ALT-0000000090
2024-08-19T01:29:15.575516+00:00
EVT-0000000547
RULE-5033
Waf Attack Pattern
HOST-00106
USR-04310
ACTOR-0001
medium
waf_attack_pattern
T1190
Initial Access
true
false
P2
true
auto_closed_low_fidelity
341,849.2
google_chronicle
1
INC-0000008
ALT-0000000091
2024-08-19T18:38:29.645355+00:00
null
RULE-6891
False Positive Noise
HOST-00106
USR-04609
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
true
auto_closed_low_fidelity
0
google_chronicle
1
INC-0000008
ALT-0000000092
2024-08-19T19:26:25.640644+00:00
null
RULE-3103
False Positive Noise
HOST-00106
USR-03880
NONE
medium
false_positive_noise
T0000
benign
false
true
P4
true
analyst_dismissed
0
google_chronicle
1
INC-0000008
ALT-0000000093
2024-08-19T19:16:10.727990+00:00
null
RULE-1082
False Positive Noise
HOST-00106
USR-01192
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
auto_closed_low_fidelity
0
google_chronicle
1
INC-0000008
ALT-0000000094
2024-07-16T23:22:44.189927+00:00
null
RULE-8311
False Positive Noise
HOST-00122
USR-03416
NONE
informational
false_positive_noise
T0000
benign
false
true
P4
false
tuning_whitelist
0
aws_security_hub
1
INC-0000009
ALT-0000000095
2024-03-10T12:43:18.052868+00:00
EVT-0000000559
RULE-2851
Waf Attack Pattern
HOST-00017
USR-02408
ACTOR-0001
informational
waf_attack_pattern
T1555
Credential Access
true
false
P4
false
null
32,912.1
arcsight_esm
2
INC-0000010
ALT-0000000096
2024-03-06T03:16:21.015625+00:00
EVT-0000000560
RULE-8688
Privilege Escalation
HOST-00017
USR-01455
ACTOR-0001
medium
privilege_escalation
T1592
Reconnaissance
true
false
P3
true
analyst_dismissed
608,848.6
arcsight_esm
3
INC-0000010
ALT-0000000097
2024-03-07T21:04:28.863705+00:00
EVT-0000000561
RULE-4785
Brute Force Attempt
HOST-00017
USR-03911
ACTOR-0001
medium
brute_force_attempt
T1078
Initial Access
true
false
P4
true
rate_limit_throttle
333,863.9
arcsight_esm
4
INC-0000010
ALT-0000000098
2024-03-07T02:04:38.078076+00:00
EVT-0000000562
RULE-4800
Waf Attack Pattern
HOST-00017
USR-02810
ACTOR-0001
medium
waf_attack_pattern
T1110
Credential Access
true
false
P3
false
null
151,794.3
arcsight_esm
6
INC-0000010
ALT-0000000099
2024-03-08T14:09:43.969579+00:00
EVT-0000000563
RULE-5679
Malware Execution
HOST-00017
USR-03899
ACTOR-0001
high
malware_execution
T1110
Credential Access
true
false
P2
false
null
633,544.3
arcsight_esm
7
INC-0000010
ALT-0000000100
2024-03-07T20:46:22.915877+00:00
EVT-0000000564
RULE-4191
C2 Beacon Pattern
HOST-00017
USR-03326
ACTOR-0001
high
c2_beacon_pattern
T1003
Credential Access
true
false
P2
true
tuning_whitelist
134,674.5
arcsight_esm
3
INC-0000010
End of preview.

CYB010 — Synthetic Security Event Log Dataset (Sample)

XpertSystems.ai Synthetic Data Platform · SKU: CYB010-SAMPLE · Version 1.0.0

This is a free preview of the full CYB010 — Synthetic Security Event Log Dataset product. It contains roughly ~10% of the full dataset at identical schema, MITRE ATT&CK technique coverage, and statistical fingerprint, so you can evaluate fit before licensing the full product.

File Rows (sample) Rows (full) Description
host_inventory.csv ~400 ~3,200 Enterprise host inventory
incident_summary.csv ~500 ~4,800 Per-incident campaign summaries
alert_records.csv ~5,162 ~42,000 SIEM alert records with triage labels
security_events.csv ~21,896 ~500,000 Raw security event log records (primary)

Dataset Summary

CYB010 simulates enterprise security event logs as a 5-phase attack lifecycle state machine across realistic detection environments, with:

  • 5 threat actor profiles: benign_user, script_kiddie, insider_threat, advanced_persistent_threat (APT), nation_state_actor — each with distinct fileless execution ratios, log tampering propensities, off-hours bias, and dwell time distributions
  • 4 defender posture tiers: minimal, standard, hardened, zero_trust — graduated detection_strength (0.42 → 0.93) and false-positive rates
  • 5-phase attack lifecycle: dormant → initial_access → lateral_movement → persistence_establishment → exfiltration_or_impact
  • 8 SIEM platform log formats with realistic per-vendor parsing: Splunk KV, Microsoft Sentinel JSON, IBM QRadar LEEF, Elastic ECS, Google Chronicle UDM, AWS Security Hub, Palo Alto XSIAM, ArcSight CEF
  • MITRE ATT&CK v14 coverage — 50 techniques across 14 tactics, mapped to all malicious events via T-codes
  • Time-of-day + day-of-week noise model — Poisson background traffic with off-hours and weekend multipliers
  • C2 beacon periodicity modeling — configurable mean interval and jitter for command-and-control detection
  • IOC seeding density — calibrated indicator-of-compromise injection for threat intel detection benchmarking

Calibrated Benchmark Targets

The full product is calibrated to 6 benchmark validation tests drawn from authoritative SOC operations and threat intelligence research (SANS SOC Survey, IBM Cost of Data Breach, Mandiant M-Trends, Verizon DBIR, CISA Joint Advisories, MITRE ATT&CK Evaluations, Splunk State of Security).

Sample benchmark results:

Test Target Observed Verdict
false_positive_alert_rate 0.4500 0.5271 ~ MARGINAL
mean_dwell_time_hours 504.0 479.4 ✓ PASS
lateral_movement_hop_rate 0.0950 0.1040 ✓ PASS
alert_suppression_rate 0.3800 0.4291 ✓ PASS
exfiltration_attempted_rate 0.3100 0.3380 ✓ PASS
patch_compliance_ratio 0.7200 0.7312 ✓ PASS

Schema Highlights

security_events.csv (primary file, raw event logs)

Column Type Description
event_id string Unique event identifier
incident_id string Parent incident FK (nullable for benign)
host_id string FK to host_inventory.csv
timestamp_utc string ISO timestamp
event_type string process_create / network_connect / file_write / login / etc.
log_format string splunk_kv / sentinel_json / qradar_leef / elastic_ecs / etc.
raw_log string Vendor-formatted log line (key=value, JSON, LEEF, etc.)
source_ip string Source IP address
dest_ip string Destination IP address
user string User account associated with event
process_name string Process executable name
command_line string Command line (truncated)
mitre_technique_id string T-number (e.g. T1059.001) — empty for benign
mitre_tactic string ATT&CK tactic category
threat_actor_profile string benign_user / script_kiddie / insider / apt / nation_state
attack_phase string 1 of 5 lifecycle phases
is_off_hours int Boolean — outside 9-17 local

alert_records.csv (SIEM alerts)

Column Type Description
alert_id string Unique alert identifier
triggering_event_id string FK to triggering security event
host_id string FK to host inventory
alert_severity string info / low / medium / high / critical
detection_rule string Rule name that fired
label_false_positive int Boolean — ground-truth FP label
suppressed_flag int Boolean — alert suppressed
ioc_matched int Boolean — IOC database match
triage_outcome string true_positive / false_positive / suppressed / escalated

incident_summary.csv (per-incident)

Column Type Description
incident_id string Unique incident identifier
threat_actor_profile string 4-class actor target
defender_posture string 4-tier defender maturity
dwell_time_hours float End-to-end attacker dwell
lateral_movement_hops int Count of lateral movement events
exfiltration_attempted_flag int Boolean — exfil attempted
campaign_success_flag int Boolean — campaign succeeded
total_events int Events generated by this incident
total_alerts int Alerts triggered

host_inventory.csv (enterprise hosts)

Column Type Description
host_id string Unique host identifier
hostname string Hostname
os_platform string windows / linux / macos / etc.
defender_posture string minimal / standard / hardened / zero_trust
patch_compliance_level float Patch compliance score (0–1)
ip_address string Primary IP

Suggested Use Cases

  • Training SIEM alert triage models — predict true_positive vs false_positive
  • MITRE ATT&CK technique classification from raw log lines
  • Threat actor attribution — 5-class with realistic class imbalance
  • Multi-format log parser training — 8 SIEM vendor formats in one corpus
  • Dwell time forecasting under varying defender posture
  • Lateral movement detection from event sequences
  • C2 beacon detection — periodic vs aperiodic network connections
  • IOC matching effectiveness — calibrated 18.5% match rate baseline
  • Log tampering detection — APT log-tamper-prob 0.35 baseline
  • Off-hours anomaly detection — APT off-hours bias 0.64

Loading the Data

import pandas as pd

events    = pd.read_csv("security_events.csv")
alerts    = pd.read_csv("alert_records.csv")
incidents = pd.read_csv("incident_summary.csv")
hosts     = pd.read_csv("host_inventory.csv")

# Join events to host context
enriched = events.merge(hosts, on="host_id", how="left",
                        suffixes=("", "_host"))

# Join alerts back to source event and incident
alerts_full = alerts.merge(events, left_on="triggering_event_id",
                           right_on="event_id", how="left",
                           suffixes=("_alert", "_event"))

# Multi-class threat actor profile target
y_actor = events["threat_actor_profile"]

# Binary false-positive prediction target
y_fp = alerts["label_false_positive"]

# Multi-class MITRE technique target (filter to malicious events)
malicious = events[events["mitre_technique_id"] != ""]
y_technique = malicious["mitre_technique_id"]

License

This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.

Full Product

The full CYB010 dataset includes ~550,000 rows across all four files, with calibrated benchmark validation against 6 metrics drawn from authoritative SOC operations and threat intelligence sources.

📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai

Citation

@dataset{xpertsystems_cyb010_sample_2026,
  title  = {CYB010: Synthetic Security Event Log Dataset (Sample)},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/datasets/xpertsystems/cyb010-sample}
}

Generation Details

  • Generator version : 1.0.0
  • Random seed : 42
  • Generated : 2026-05-16 14:37:46 UTC
  • Attack lifecycle : 5-phase finite state machine
  • Overall benchmark : 95.3 / 100 (grade A)
Downloads last month
9