The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 14 new columns ({'siem_platform', 'criticality_rating', 'ip_address', 'host_role', 'network_segment', 'os_type', 'patch_compliance_level', 'hostname', 'os_version', 'defender_posture_tier', 'cloud_region', 'cloud_provider', 'edr_agent_installed', 'vulnerability_count_open'}) and 20 missing columns ({'alert_rule_id', 'time_to_detect_seconds', 'user_id', 'analyst_triage_priority', 'timestamp', 'alert_category', 'suppressed_flag', 'label_true_positive', 'label_false_positive', 'alert_rule_name', 'correlated_chain_length', 'threat_actor_id', 'severity_level', 'mitre_technique_id', 'mitre_tactic', 'suppression_reason', 'correlated_event_ids', 'siem_platform_type', 'incident_id', 'alert_id'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb010-sample/host_inventory.csv (at revision 1a74c11944fa2b06df38454b860cc561f6e9a35f), [/tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
host_id: string
hostname: string
ip_address: string
os_type: string
os_version: string
host_role: string
network_segment: string
defender_posture_tier: string
edr_agent_installed: bool
patch_compliance_level: double
criticality_rating: string
cloud_provider: string
cloud_region: string
vulnerability_count_open: int64
siem_platform: string
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 2172
to
{'alert_id': Value('string'), 'timestamp': Value('string'), 'correlated_event_ids': Value('string'), 'alert_rule_id': Value('string'), 'alert_rule_name': Value('string'), 'host_id': Value('string'), 'user_id': Value('string'), 'threat_actor_id': Value('string'), 'severity_level': Value('string'), 'alert_category': Value('string'), 'mitre_technique_id': Value('string'), 'mitre_tactic': Value('string'), 'label_true_positive': Value('bool'), 'label_false_positive': Value('bool'), 'analyst_triage_priority': Value('string'), 'suppressed_flag': Value('bool'), 'suppression_reason': Value('string'), 'time_to_detect_seconds': Value('float64'), 'siem_platform_type': Value('string'), 'correlated_chain_length': Value('int64'), 'incident_id': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 14 new columns ({'siem_platform', 'criticality_rating', 'ip_address', 'host_role', 'network_segment', 'os_type', 'patch_compliance_level', 'hostname', 'os_version', 'defender_posture_tier', 'cloud_region', 'cloud_provider', 'edr_agent_installed', 'vulnerability_count_open'}) and 20 missing columns ({'alert_rule_id', 'time_to_detect_seconds', 'user_id', 'analyst_triage_priority', 'timestamp', 'alert_category', 'suppressed_flag', 'label_true_positive', 'label_false_positive', 'alert_rule_name', 'correlated_chain_length', 'threat_actor_id', 'severity_level', 'mitre_technique_id', 'mitre_tactic', 'suppression_reason', 'correlated_event_ids', 'siem_platform_type', 'incident_id', 'alert_id'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb010-sample/host_inventory.csv (at revision 1a74c11944fa2b06df38454b860cc561f6e9a35f), [/tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/alert_records.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/host_inventory.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/53073360011652-config-parquet-and-info-xpertsystems-cyb010-sampl-842617e1/hub/datasets--xpertsystems--cyb010-sample/snapshots/1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv (origin=hf://datasets/xpertsystems/cyb010-sample@1a74c11944fa2b06df38454b860cc561f6e9a35f/security_events.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
alert_id string | timestamp string | correlated_event_ids string | alert_rule_id string | alert_rule_name string | host_id string | user_id string | threat_actor_id string | severity_level string | alert_category string | mitre_technique_id string | mitre_tactic string | label_true_positive bool | label_false_positive bool | analyst_triage_priority string | suppressed_flag bool | suppression_reason string | time_to_detect_seconds float64 | siem_platform_type string | correlated_chain_length int64 | incident_id string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ALT-0000000001 | 2024-07-22T04:15:58.879047+00:00 | EVT-0000000049 | RULE-6718 | Persistence Mechanism | HOST-00352 | USR-03415 | ACTOR-0001 | informational | persistence_mechanism | T1592 | Reconnaissance | true | false | P4 | false | null | 37,756.3 | splunk | 2 | INC-0000001 |
ALT-0000000002 | 2024-07-22T21:55:40.046569+00:00 | EVT-0000000050 | RULE-1163 | Insider Threat Indicator | HOST-00352 | USR-04082 | ACTOR-0001 | high | insider_threat_indicator | T1003 | Credential Access | true | false | P2 | false | null | 87,374 | splunk | 1 | INC-0000001 |
ALT-0000000003 | 2024-07-20T18:45:24.189759+00:00 | null | RULE-6545 | False Positive Noise | HOST-00352 | USR-00511 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | auto_closed_low_fidelity | 0 | splunk | 1 | INC-0000001 |
ALT-0000000004 | 2024-07-20T15:18:02.401523+00:00 | null | RULE-1149 | False Positive Noise | HOST-00352 | USR-04928 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | false | analyst_dismissed | 0 | splunk | 1 | INC-0000001 |
ALT-0000000005 | 2024-07-19T06:04:46.852497+00:00 | null | RULE-8006 | False Positive Noise | HOST-00352 | USR-02137 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | analyst_dismissed | 0 | splunk | 1 | INC-0000001 |
ALT-0000000006 | 2024-07-21T03:44:19.745498+00:00 | null | RULE-3486 | False Positive Noise | HOST-00352 | USR-02016 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | splunk | 1 | INC-0000001 |
ALT-0000000007 | 2024-11-25T04:44:36.282470+00:00 | null | RULE-9926 | False Positive Noise | HOST-00043 | USR-01348 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | rate_limit_throttle | 0 | aws_security_hub | 1 | INC-0000002 |
ALT-0000000008 | 2024-11-25T04:52:20.633838+00:00 | null | RULE-4439 | False Positive Noise | HOST-00043 | USR-04984 | NONE | medium | false_positive_noise | T0000 | benign | false | true | P4 | false | analyst_dismissed | 0 | aws_security_hub | 1 | INC-0000002 |
ALT-0000000009 | 2024-05-16T15:05:21.021861+00:00 | EVT-0000000104 | RULE-5383 | Insider Threat Indicator | HOST-00010 | USR-03597 | ACTOR-0001 | high | insider_threat_indicator | T1195 | Initial Access | true | false | P3 | true | rate_limit_throttle | 174,498.2 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000010 | 2024-05-16T11:57:56.530298+00:00 | EVT-0000000106 | RULE-1328 | Policy Violation | HOST-00010 | USR-00638 | ACTOR-0001 | high | policy_violation | T1595 | Reconnaissance | true | false | P3 | true | auto_closed_low_fidelity | 174,787 | arcsight_esm | 3 | INC-0000003 |
ALT-0000000011 | 2024-05-16T12:47:09.238924+00:00 | EVT-0000000107 | RULE-5163 | Policy Violation | HOST-00010 | USR-01172 | ACTOR-0001 | medium | policy_violation | T1110 | Credential Access | true | false | P3 | true | tuning_whitelist | 82,656.9 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000012 | 2024-05-16T12:47:09.238924+00:00 | EVT-0000000107 | RULE-4961 | False Positive Noise | HOST-00010 | USR-00223 | NONE | medium | false_positive_noise | T0000 | benign | false | true | P4 | false | duplicate_correlation | 0 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000013 | 2024-05-16T04:41:13.260536+00:00 | EVT-0000000108 | RULE-4018 | Policy Violation | HOST-00010 | USR-03627 | ACTOR-0001 | medium | policy_violation | T1590 | Reconnaissance | true | false | P3 | true | auto_closed_low_fidelity | 128,286.4 | arcsight_esm | 2 | INC-0000003 |
ALT-0000000014 | 2024-05-16T14:54:45.028999+00:00 | EVT-0000000109 | RULE-3550 | C2 Beacon Pattern | HOST-00010 | USR-03404 | ACTOR-0001 | critical | c2_beacon_pattern | T1592 | Reconnaissance | true | false | P3 | false | null | 13,098.8 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000015 | 2024-05-16T23:18:05.065137+00:00 | EVT-0000000110 | RULE-9039 | Dns Tunnelling Indicator | HOST-00010 | USR-03426 | ACTOR-0001 | low | dns_tunnelling_indicator | T1590 | Reconnaissance | true | false | P3 | false | null | 96,956.9 | arcsight_esm | 9 | INC-0000003 |
ALT-0000000016 | 2024-05-16T13:25:11.273443+00:00 | null | RULE-6628 | False Positive Noise | HOST-00010 | USR-01119 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | tuning_whitelist | 0 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000017 | 2024-05-16T13:35:52.413631+00:00 | null | RULE-7011 | False Positive Noise | HOST-00010 | USR-02066 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | duplicate_correlation | 0 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000018 | 2024-05-16T13:19:49.889198+00:00 | null | RULE-6615 | False Positive Noise | HOST-00010 | USR-00229 | NONE | medium | false_positive_noise | T0000 | benign | false | true | P4 | false | tuning_whitelist | 0 | arcsight_esm | 1 | INC-0000003 |
ALT-0000000019 | 2024-04-20T20:46:29.729216+00:00 | EVT-0000000154 | RULE-5953 | Dns Tunnelling Indicator | HOST-00208 | USR-00135 | ACTOR-0001 | medium | dns_tunnelling_indicator | T1078 | Initial Access | true | false | P4 | true | tuning_whitelist | 574,001.5 | splunk | 5 | INC-0000004 |
ALT-0000000020 | 2024-03-31T09:19:22.911907+00:00 | EVT-0000000155 | RULE-6141 | Lateral Movement Detected | HOST-00208 | USR-03551 | ACTOR-0001 | low | lateral_movement_detected | T1190 | Initial Access | true | false | P4 | false | null | 168,991.3 | splunk | 10 | INC-0000004 |
ALT-0000000021 | 2024-04-04T20:27:41.215905+00:00 | EVT-0000000156 | RULE-3339 | Policy Violation | HOST-00208 | USR-01403 | ACTOR-0001 | low | policy_violation | T1003 | Credential Access | true | false | P3 | false | null | 158,940 | splunk | 1 | INC-0000004 |
ALT-0000000022 | 2024-04-11T00:26:48.332270+00:00 | EVT-0000000157 | RULE-1310 | Data Exfiltration Indicator | HOST-00208 | USR-03726 | ACTOR-0001 | medium | data_exfiltration_indicator | T1055 | Privilege Escalation | true | false | P3 | false | null | 245,444.1 | splunk | 1 | INC-0000004 |
ALT-0000000023 | 2024-05-08T22:10:48.813533+00:00 | EVT-0000000158 | RULE-9319 | Anomalous Cloud Activity | HOST-00208 | USR-03185 | ACTOR-0001 | high | anomalous_cloud_activity | T1003 | Credential Access | true | false | P2 | true | tuning_whitelist | 1,111,874 | splunk | 2 | INC-0000004 |
ALT-0000000024 | 2024-04-21T08:12:08.908518+00:00 | EVT-0000000159 | RULE-3452 | C2 Beacon Pattern | HOST-00208 | USR-01897 | ACTOR-0001 | high | c2_beacon_pattern | T1021 | Lateral Movement | true | false | P4 | false | null | 479,197.3 | splunk | 5 | INC-0000004 |
ALT-0000000025 | 2024-02-04T10:00:40.115582+00:00 | EVT-0000000261 | RULE-9846 | Insider Threat Indicator | HOST-00156 | USR-00324 | ACTOR-0001 | low | insider_threat_indicator | T1190 | Initial Access | true | false | P4 | false | null | 547,930.6 | splunk | 1 | INC-0000005 |
ALT-0000000026 | 2024-02-04T10:00:40.115582+00:00 | EVT-0000000261 | RULE-6837 | False Positive Noise | HOST-00156 | USR-00136 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | analyst_dismissed | 0 | splunk | 1 | INC-0000005 |
ALT-0000000027 | 2024-02-11T12:24:05.729468+00:00 | EVT-0000000262 | RULE-8864 | Brute Force Attempt | HOST-00156 | USR-04316 | ACTOR-0001 | medium | brute_force_attempt | T1534 | Lateral Movement | true | false | P4 | false | null | 88,514.5 | splunk | 1 | INC-0000005 |
ALT-0000000028 | 2024-02-13T02:52:01.076184+00:00 | EVT-0000000263 | RULE-3562 | Persistence Mechanism | HOST-00156 | USR-03021 | ACTOR-0001 | high | persistence_mechanism | T1558 | Credential Access | true | false | P4 | false | null | 457,338.2 | splunk | 1 | INC-0000005 |
ALT-0000000029 | 2024-02-13T02:52:01.076184+00:00 | EVT-0000000263 | RULE-4295 | False Positive Noise | HOST-00156 | USR-04169 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | analyst_dismissed | 0 | splunk | 1 | INC-0000005 |
ALT-0000000030 | 2024-02-12T22:10:13.024235+00:00 | EVT-0000000264 | RULE-6327 | Anomalous Cloud Activity | HOST-00156 | USR-01023 | ACTOR-0001 | medium | anomalous_cloud_activity | T1562 | Defense Evasion | true | false | P3 | false | null | 186,522 | splunk | 2 | INC-0000005 |
ALT-0000000031 | 2024-02-09T10:48:00.370758+00:00 | EVT-0000000265 | RULE-6787 | Dns Tunnelling Indicator | HOST-00156 | USR-00413 | ACTOR-0001 | informational | dns_tunnelling_indicator | T1070 | Defense Evasion | true | false | P4 | true | duplicate_correlation | 814,083.8 | splunk | 7 | INC-0000005 |
ALT-0000000032 | 2024-02-09T20:57:16.174551+00:00 | EVT-0000000266 | RULE-3145 | Privilege Escalation | HOST-00156 | USR-02181 | ACTOR-0001 | critical | privilege_escalation | T1027 | Defense Evasion | true | false | P2 | false | null | 190,810.6 | splunk | 1 | INC-0000005 |
ALT-0000000033 | 2024-02-07T05:48:28.827678+00:00 | EVT-0000000267 | RULE-7366 | Lateral Movement Detected | HOST-00156 | USR-01056 | ACTOR-0001 | critical | lateral_movement_detected | T1027 | Defense Evasion | true | false | P4 | false | null | 698,881.4 | splunk | 4 | INC-0000005 |
ALT-0000000034 | 2024-02-12T14:30:12.795594+00:00 | EVT-0000000268 | RULE-1515 | Persistence Mechanism | HOST-00156 | USR-02271 | ACTOR-0001 | high | persistence_mechanism | T1570 | Lateral Movement | true | false | P3 | true | analyst_dismissed | 265,464.6 | splunk | 1 | INC-0000005 |
ALT-0000000035 | 2024-02-13T12:43:03.074736+00:00 | EVT-0000000269 | RULE-9218 | Credential Stuffing | HOST-00156 | USR-01476 | ACTOR-0001 | low | credential_stuffing | T1070 | Defense Evasion | true | false | P3 | false | null | 148,385.2 | splunk | 6 | INC-0000005 |
ALT-0000000036 | 2024-02-08T22:23:35.072602+00:00 | EVT-0000000270 | RULE-7233 | Dns Tunnelling Indicator | HOST-00156 | USR-00355 | ACTOR-0001 | medium | dns_tunnelling_indicator | T1558 | Credential Access | true | false | P4 | false | null | 480,809.5 | splunk | 11 | INC-0000005 |
ALT-0000000037 | 2024-02-22T22:17:50.061427+00:00 | EVT-0000000271 | RULE-5541 | Waf Attack Pattern | HOST-00156 | USR-03367 | ACTOR-0001 | medium | waf_attack_pattern | T1136 | Persistence | true | false | P4 | false | null | 64,295.3 | splunk | 1 | INC-0000005 |
ALT-0000000038 | 2024-02-19T00:41:11.771439+00:00 | EVT-0000000273 | RULE-1517 | Dns Tunnelling Indicator | HOST-00156 | USR-02240 | ACTOR-0001 | critical | dns_tunnelling_indicator | T1218 | Defense Evasion | true | false | P2 | true | duplicate_correlation | 394,457.5 | splunk | 1 | INC-0000005 |
ALT-0000000039 | 2024-02-19T00:41:11.771439+00:00 | EVT-0000000273 | RULE-7621 | False Positive Noise | HOST-00156 | USR-04242 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | duplicate_correlation | 0 | splunk | 1 | INC-0000005 |
ALT-0000000040 | 2024-02-22T01:34:29.324413+00:00 | EVT-0000000274 | RULE-8614 | Policy Violation | HOST-00156 | USR-00435 | ACTOR-0001 | low | policy_violation | T1547 | Persistence | true | false | P4 | false | null | 903.2 | splunk | 1 | INC-0000005 |
ALT-0000000041 | 2024-02-18T22:55:34.814303+00:00 | EVT-0000000275 | RULE-3158 | Credential Stuffing | HOST-00156 | USR-04783 | ACTOR-0001 | medium | credential_stuffing | T1548 | Privilege Escalation | true | false | P4 | true | rate_limit_throttle | 390,250.9 | splunk | 8 | INC-0000005 |
ALT-0000000042 | 2024-02-18T22:55:34.814303+00:00 | EVT-0000000275 | RULE-3888 | False Positive Noise | HOST-00156 | USR-04896 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | analyst_dismissed | 0 | splunk | 1 | INC-0000005 |
ALT-0000000043 | 2024-03-03T02:11:30.035331+00:00 | EVT-0000000279 | RULE-4405 | Data Exfiltration Indicator | HOST-00156 | USR-00068 | ACTOR-0001 | high | data_exfiltration_indicator | T1572 | Command and Control | true | false | P2 | true | tuning_whitelist | 915,468.6 | splunk | 6 | INC-0000005 |
ALT-0000000044 | 2024-02-26T03:34:59.978087+00:00 | EVT-0000000280 | RULE-2821 | Insider Threat Indicator | HOST-00156 | USR-01776 | ACTOR-0001 | medium | insider_threat_indicator | T1074 | Collection | true | false | P4 | true | rate_limit_throttle | 82,060.8 | splunk | 2 | INC-0000005 |
ALT-0000000045 | 2024-03-02T01:33:37.113452+00:00 | EVT-0000000281 | RULE-2818 | C2 Beacon Pattern | HOST-00156 | USR-02975 | ACTOR-0001 | medium | c2_beacon_pattern | T1105 | Command and Control | true | false | P3 | true | analyst_dismissed | 303,850.5 | splunk | 3 | INC-0000005 |
ALT-0000000046 | 2024-02-27T03:58:11.643224+00:00 | EVT-0000000282 | RULE-8146 | Privilege Escalation | HOST-00156 | USR-02314 | ACTOR-0001 | critical | privilege_escalation | T1567 | Exfiltration | true | false | P1 | false | null | 682,426.3 | splunk | 3 | INC-0000005 |
ALT-0000000047 | 2024-03-04T01:41:52.027994+00:00 | EVT-0000000283 | RULE-1604 | C2 Beacon Pattern | HOST-00156 | USR-02232 | ACTOR-0001 | medium | c2_beacon_pattern | T1114 | Collection | true | false | P3 | false | null | 1,140,272.9 | splunk | 6 | INC-0000005 |
ALT-0000000048 | 2024-03-04T02:04:38.640080+00:00 | null | RULE-6085 | False Positive Noise | HOST-00156 | USR-00051 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | tuning_whitelist | 0 | splunk | 1 | INC-0000005 |
ALT-0000000049 | 2024-02-04T21:23:12.356010+00:00 | null | RULE-4360 | False Positive Noise | HOST-00156 | USR-04343 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | analyst_dismissed | 0 | splunk | 1 | INC-0000005 |
ALT-0000000050 | 2024-03-04T08:48:53.980147+00:00 | null | RULE-6962 | False Positive Noise | HOST-00156 | USR-03212 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | splunk | 1 | INC-0000005 |
ALT-0000000051 | 2024-02-28T06:33:20.709017+00:00 | null | RULE-1996 | False Positive Noise | HOST-00156 | USR-03954 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | tuning_whitelist | 0 | splunk | 1 | INC-0000005 |
ALT-0000000052 | 2024-01-29T22:57:26.418298+00:00 | null | RULE-4319 | False Positive Noise | HOST-00156 | USR-02992 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | auto_closed_low_fidelity | 0 | splunk | 1 | INC-0000005 |
ALT-0000000053 | 2024-02-27T23:23:57.387644+00:00 | null | RULE-6467 | False Positive Noise | HOST-00156 | USR-03210 | NONE | medium | false_positive_noise | T0000 | benign | false | true | P4 | false | rate_limit_throttle | 0 | splunk | 1 | INC-0000005 |
ALT-0000000054 | 2024-02-08T20:34:17.980473+00:00 | null | RULE-6633 | False Positive Noise | HOST-00156 | USR-01848 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | duplicate_correlation | 0 | splunk | 1 | INC-0000005 |
ALT-0000000055 | 2024-07-25T04:00:33.838604+00:00 | EVT-0000000386 | RULE-3020 | Anomalous Cloud Activity | HOST-00097 | USR-00410 | ACTOR-0001 | low | anomalous_cloud_activity | T1590 | Reconnaissance | true | false | P2 | false | null | 137,931 | palo_alto_xsiam | 4 | INC-0000006 |
ALT-0000000056 | 2024-07-24T22:10:00.368869+00:00 | EVT-0000000387 | RULE-4478 | Anomalous Cloud Activity | HOST-00097 | USR-02820 | ACTOR-0001 | high | anomalous_cloud_activity | T1590 | Reconnaissance | true | false | P2 | false | null | 53,320.7 | palo_alto_xsiam | 2 | INC-0000006 |
ALT-0000000057 | 2024-07-23T23:33:30.683763+00:00 | EVT-0000000388 | RULE-8366 | Persistence Mechanism | HOST-00097 | USR-04224 | ACTOR-0001 | critical | persistence_mechanism | T1589 | Reconnaissance | true | false | P3 | false | null | 603,396.9 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000058 | 2024-07-21T20:38:15.630013+00:00 | EVT-0000000389 | RULE-5017 | Privilege Escalation | HOST-00097 | USR-01512 | ACTOR-0001 | medium | privilege_escalation | T1190 | Initial Access | true | false | P3 | true | auto_closed_low_fidelity | 192,628.6 | palo_alto_xsiam | 3 | INC-0000006 |
ALT-0000000059 | 2024-07-13T22:15:36.358947+00:00 | EVT-0000000390 | RULE-8073 | Credential Stuffing | HOST-00097 | USR-00916 | ACTOR-0001 | high | credential_stuffing | T1592 | Reconnaissance | true | false | P2 | true | rate_limit_throttle | 408,244.7 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000060 | 2024-07-12T21:37:39.442758+00:00 | EVT-0000000391 | RULE-2648 | Privilege Escalation | HOST-00097 | USR-02927 | ACTOR-0001 | low | privilege_escalation | T1589 | Reconnaissance | true | false | P3 | true | duplicate_correlation | 208,328.4 | palo_alto_xsiam | 2 | INC-0000006 |
ALT-0000000061 | 2024-07-16T01:04:21.835939+00:00 | EVT-0000000392 | RULE-5073 | Lateral Movement Detected | HOST-00097 | USR-01210 | ACTOR-0001 | medium | lateral_movement_detected | T1195 | Initial Access | true | false | P4 | false | null | 62,678.7 | palo_alto_xsiam | 4 | INC-0000006 |
ALT-0000000062 | 2024-09-15T23:15:23.100184+00:00 | EVT-0000000393 | RULE-7505 | Insider Threat Indicator | HOST-00097 | USR-01458 | ACTOR-0001 | low | insider_threat_indicator | T1016 | Discovery | true | false | P3 | false | null | 769,667.3 | palo_alto_xsiam | 3 | INC-0000006 |
ALT-0000000063 | 2024-08-21T17:43:29.487820+00:00 | EVT-0000000394 | RULE-5742 | Lateral Movement Detected | HOST-00097 | USR-04246 | ACTOR-0001 | critical | lateral_movement_detected | T1555 | Credential Access | true | false | P3 | false | null | 230,131.1 | palo_alto_xsiam | 5 | INC-0000006 |
ALT-0000000064 | 2024-08-17T23:31:27.992471+00:00 | EVT-0000000395 | RULE-9443 | Dns Tunnelling Indicator | HOST-00097 | USR-03451 | ACTOR-0001 | low | dns_tunnelling_indicator | T1016 | Discovery | true | false | P4 | true | rate_limit_throttle | 1,028,831.5 | palo_alto_xsiam | 7 | INC-0000006 |
ALT-0000000065 | 2024-09-03T01:47:43.434878+00:00 | EVT-0000000396 | RULE-5782 | Malware Execution | HOST-00097 | USR-04539 | ACTOR-0001 | high | malware_execution | T1070 | Defense Evasion | true | false | P2 | false | null | 324,901.4 | palo_alto_xsiam | 2 | INC-0000006 |
ALT-0000000066 | 2024-09-01T05:52:15.500451+00:00 | EVT-0000000397 | RULE-7479 | Threat Intel Ioc Match | HOST-00097 | USR-04396 | ACTOR-0001 | low | threat_intel_ioc_match | T1016 | Discovery | true | false | P4 | true | analyst_dismissed | 218,952.8 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000067 | 2024-08-19T05:37:36.600256+00:00 | EVT-0000000399 | RULE-6028 | Malware Execution | HOST-00097 | USR-04024 | ACTOR-0001 | high | malware_execution | T1016 | Discovery | true | false | P4 | false | null | 114,671.1 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000068 | 2024-09-29T05:29:57.721956+00:00 | EVT-0000000400 | RULE-6736 | Waf Attack Pattern | HOST-00097 | USR-03543 | ACTOR-0001 | high | waf_attack_pattern | T1068 | Privilege Escalation | true | false | P2 | false | null | 173,539.2 | palo_alto_xsiam | 9 | INC-0000006 |
ALT-0000000069 | 2024-09-18T08:23:12.100934+00:00 | EVT-0000000401 | RULE-7750 | Anomalous Cloud Activity | HOST-00097 | USR-02125 | ACTOR-0001 | critical | anomalous_cloud_activity | T1027 | Defense Evasion | true | false | P3 | false | null | 72,326.4 | palo_alto_xsiam | 11 | INC-0000006 |
ALT-0000000070 | 2024-10-22T00:20:11.059250+00:00 | EVT-0000000402 | RULE-3941 | Insider Threat Indicator | HOST-00097 | USR-00510 | ACTOR-0001 | medium | insider_threat_indicator | T1134 | Privilege Escalation | true | false | P4 | true | rate_limit_throttle | 1,044,622.7 | palo_alto_xsiam | 2 | INC-0000006 |
ALT-0000000071 | 2024-10-22T00:20:11.059250+00:00 | EVT-0000000402 | RULE-5626 | False Positive Noise | HOST-00097 | USR-00618 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | rate_limit_throttle | 0 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000072 | 2024-11-12T23:48:03.297976+00:00 | EVT-0000000403 | RULE-8476 | Threat Intel Ioc Match | HOST-00097 | USR-03506 | ACTOR-0001 | medium | threat_intel_ioc_match | T1095 | Command and Control | true | false | P4 | false | null | 340,486 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000073 | 2024-11-03T22:13:57.443204+00:00 | EVT-0000000404 | RULE-9810 | Anomalous Cloud Activity | HOST-00097 | USR-03227 | ACTOR-0001 | high | anomalous_cloud_activity | T1560 | Collection | true | false | P4 | true | auto_closed_low_fidelity | 18,990 | palo_alto_xsiam | 5 | INC-0000006 |
ALT-0000000074 | 2024-11-09T11:05:47.852310+00:00 | EVT-0000000405 | RULE-3815 | Malware Execution | HOST-00097 | USR-04969 | ACTOR-0001 | high | malware_execution | T1071 | Command and Control | true | false | P1 | true | auto_closed_low_fidelity | 162,296.9 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000075 | 2024-10-22T19:04:47.397336+00:00 | null | RULE-8430 | False Positive Noise | HOST-00097 | USR-03242 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | tuning_whitelist | 0 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000076 | 2024-07-15T20:03:57.913813+00:00 | null | RULE-4150 | False Positive Noise | HOST-00097 | USR-03225 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000077 | 2024-08-07T22:07:11.523453+00:00 | null | RULE-8394 | False Positive Noise | HOST-00097 | USR-02607 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | rate_limit_throttle | 0 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000078 | 2024-09-09T19:53:42.853274+00:00 | null | RULE-3956 | False Positive Noise | HOST-00097 | USR-01201 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | false | analyst_dismissed | 0 | palo_alto_xsiam | 1 | INC-0000006 |
ALT-0000000079 | 2024-08-04T13:48:34.787387+00:00 | null | RULE-8085 | False Positive Noise | HOST-00172 | USR-04214 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | duplicate_correlation | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000080 | 2024-08-04T15:11:52.732248+00:00 | null | RULE-9677 | False Positive Noise | HOST-00172 | USR-00025 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | false | duplicate_correlation | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000081 | 2024-08-04T14:13:45.295599+00:00 | null | RULE-9203 | False Positive Noise | HOST-00172 | USR-00236 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000082 | 2024-08-04T13:09:45.953548+00:00 | null | RULE-5079 | False Positive Noise | HOST-00172 | USR-01984 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | false | analyst_dismissed | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000083 | 2024-08-04T13:01:51.315291+00:00 | null | RULE-7004 | False Positive Noise | HOST-00172 | USR-00909 | NONE | low | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000084 | 2024-08-04T12:29:55.986033+00:00 | null | RULE-3218 | False Positive Noise | HOST-00172 | USR-04397 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | duplicate_correlation | 0 | microsoft_sentinel | 1 | INC-0000007 |
ALT-0000000085 | 2024-08-19T01:40:34.335328+00:00 | EVT-0000000542 | RULE-8168 | Insider Threat Indicator | HOST-00106 | USR-02274 | ACTOR-0001 | low | insider_threat_indicator | T1133 | Initial Access | true | false | P4 | false | null | 454,113.7 | google_chronicle | 2 | INC-0000008 |
ALT-0000000086 | 2024-08-19T14:20:15.316792+00:00 | EVT-0000000543 | RULE-3005 | Persistence Mechanism | HOST-00106 | USR-00480 | ACTOR-0001 | informational | persistence_mechanism | T1555 | Credential Access | true | false | P4 | true | duplicate_correlation | 1,179,691.1 | google_chronicle | 9 | INC-0000008 |
ALT-0000000087 | 2024-08-19T23:12:57.470637+00:00 | EVT-0000000544 | RULE-5564 | Privilege Escalation | HOST-00106 | USR-03513 | ACTOR-0001 | medium | privilege_escalation | T1078 | Initial Access | true | false | P2 | false | null | 337,721.3 | google_chronicle | 1 | INC-0000008 |
ALT-0000000088 | 2024-08-19T22:52:16.210696+00:00 | EVT-0000000545 | RULE-6660 | Waf Attack Pattern | HOST-00106 | USR-00819 | ACTOR-0001 | low | waf_attack_pattern | T1555 | Credential Access | true | false | P4 | false | null | 1,174,470 | google_chronicle | 3 | INC-0000008 |
ALT-0000000089 | 2024-08-19T12:26:01.330625+00:00 | EVT-0000000546 | RULE-2501 | Anomalous Cloud Activity | HOST-00106 | USR-04219 | ACTOR-0001 | low | anomalous_cloud_activity | T1190 | Initial Access | true | false | P3 | false | null | 53,769.5 | google_chronicle | 1 | INC-0000008 |
ALT-0000000090 | 2024-08-19T01:29:15.575516+00:00 | EVT-0000000547 | RULE-5033 | Waf Attack Pattern | HOST-00106 | USR-04310 | ACTOR-0001 | medium | waf_attack_pattern | T1190 | Initial Access | true | false | P2 | true | auto_closed_low_fidelity | 341,849.2 | google_chronicle | 1 | INC-0000008 |
ALT-0000000091 | 2024-08-19T18:38:29.645355+00:00 | null | RULE-6891 | False Positive Noise | HOST-00106 | USR-04609 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | true | auto_closed_low_fidelity | 0 | google_chronicle | 1 | INC-0000008 |
ALT-0000000092 | 2024-08-19T19:26:25.640644+00:00 | null | RULE-3103 | False Positive Noise | HOST-00106 | USR-03880 | NONE | medium | false_positive_noise | T0000 | benign | false | true | P4 | true | analyst_dismissed | 0 | google_chronicle | 1 | INC-0000008 |
ALT-0000000093 | 2024-08-19T19:16:10.727990+00:00 | null | RULE-1082 | False Positive Noise | HOST-00106 | USR-01192 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | auto_closed_low_fidelity | 0 | google_chronicle | 1 | INC-0000008 |
ALT-0000000094 | 2024-07-16T23:22:44.189927+00:00 | null | RULE-8311 | False Positive Noise | HOST-00122 | USR-03416 | NONE | informational | false_positive_noise | T0000 | benign | false | true | P4 | false | tuning_whitelist | 0 | aws_security_hub | 1 | INC-0000009 |
ALT-0000000095 | 2024-03-10T12:43:18.052868+00:00 | EVT-0000000559 | RULE-2851 | Waf Attack Pattern | HOST-00017 | USR-02408 | ACTOR-0001 | informational | waf_attack_pattern | T1555 | Credential Access | true | false | P4 | false | null | 32,912.1 | arcsight_esm | 2 | INC-0000010 |
ALT-0000000096 | 2024-03-06T03:16:21.015625+00:00 | EVT-0000000560 | RULE-8688 | Privilege Escalation | HOST-00017 | USR-01455 | ACTOR-0001 | medium | privilege_escalation | T1592 | Reconnaissance | true | false | P3 | true | analyst_dismissed | 608,848.6 | arcsight_esm | 3 | INC-0000010 |
ALT-0000000097 | 2024-03-07T21:04:28.863705+00:00 | EVT-0000000561 | RULE-4785 | Brute Force Attempt | HOST-00017 | USR-03911 | ACTOR-0001 | medium | brute_force_attempt | T1078 | Initial Access | true | false | P4 | true | rate_limit_throttle | 333,863.9 | arcsight_esm | 4 | INC-0000010 |
ALT-0000000098 | 2024-03-07T02:04:38.078076+00:00 | EVT-0000000562 | RULE-4800 | Waf Attack Pattern | HOST-00017 | USR-02810 | ACTOR-0001 | medium | waf_attack_pattern | T1110 | Credential Access | true | false | P3 | false | null | 151,794.3 | arcsight_esm | 6 | INC-0000010 |
ALT-0000000099 | 2024-03-08T14:09:43.969579+00:00 | EVT-0000000563 | RULE-5679 | Malware Execution | HOST-00017 | USR-03899 | ACTOR-0001 | high | malware_execution | T1110 | Credential Access | true | false | P2 | false | null | 633,544.3 | arcsight_esm | 7 | INC-0000010 |
ALT-0000000100 | 2024-03-07T20:46:22.915877+00:00 | EVT-0000000564 | RULE-4191 | C2 Beacon Pattern | HOST-00017 | USR-03326 | ACTOR-0001 | high | c2_beacon_pattern | T1003 | Credential Access | true | false | P2 | true | tuning_whitelist | 134,674.5 | arcsight_esm | 3 | INC-0000010 |
CYB010 — Synthetic Security Event Log Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB010-SAMPLE · Version 1.0.0
This is a free preview of the full CYB010 — Synthetic Security Event Log Dataset product. It contains roughly ~10% of the full dataset at identical schema, MITRE ATT&CK technique coverage, and statistical fingerprint, so you can evaluate fit before licensing the full product.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
host_inventory.csv |
~400 | ~3,200 | Enterprise host inventory |
incident_summary.csv |
~500 | ~4,800 | Per-incident campaign summaries |
alert_records.csv |
~5,162 | ~42,000 | SIEM alert records with triage labels |
security_events.csv |
~21,896 | ~500,000 | Raw security event log records (primary) |
Dataset Summary
CYB010 simulates enterprise security event logs as a 5-phase attack lifecycle state machine across realistic detection environments, with:
- 5 threat actor profiles: benign_user, script_kiddie, insider_threat, advanced_persistent_threat (APT), nation_state_actor — each with distinct fileless execution ratios, log tampering propensities, off-hours bias, and dwell time distributions
- 4 defender posture tiers: minimal, standard, hardened, zero_trust — graduated detection_strength (0.42 → 0.93) and false-positive rates
- 5-phase attack lifecycle: dormant → initial_access → lateral_movement → persistence_establishment → exfiltration_or_impact
- 8 SIEM platform log formats with realistic per-vendor parsing: Splunk KV, Microsoft Sentinel JSON, IBM QRadar LEEF, Elastic ECS, Google Chronicle UDM, AWS Security Hub, Palo Alto XSIAM, ArcSight CEF
- MITRE ATT&CK v14 coverage — 50 techniques across 14 tactics, mapped to all malicious events via T-codes
- Time-of-day + day-of-week noise model — Poisson background traffic with off-hours and weekend multipliers
- C2 beacon periodicity modeling — configurable mean interval and jitter for command-and-control detection
- IOC seeding density — calibrated indicator-of-compromise injection for threat intel detection benchmarking
Calibrated Benchmark Targets
The full product is calibrated to 6 benchmark validation tests drawn from authoritative SOC operations and threat intelligence research (SANS SOC Survey, IBM Cost of Data Breach, Mandiant M-Trends, Verizon DBIR, CISA Joint Advisories, MITRE ATT&CK Evaluations, Splunk State of Security).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|---|---|---|---|
| false_positive_alert_rate | 0.4500 | 0.5271 | ~ MARGINAL |
| mean_dwell_time_hours | 504.0 | 479.4 | ✓ PASS |
| lateral_movement_hop_rate | 0.0950 | 0.1040 | ✓ PASS |
| alert_suppression_rate | 0.3800 | 0.4291 | ✓ PASS |
| exfiltration_attempted_rate | 0.3100 | 0.3380 | ✓ PASS |
| patch_compliance_ratio | 0.7200 | 0.7312 | ✓ PASS |
Schema Highlights
security_events.csv (primary file, raw event logs)
| Column | Type | Description |
|---|---|---|
| event_id | string | Unique event identifier |
| incident_id | string | Parent incident FK (nullable for benign) |
| host_id | string | FK to host_inventory.csv |
| timestamp_utc | string | ISO timestamp |
| event_type | string | process_create / network_connect / file_write / login / etc. |
| log_format | string | splunk_kv / sentinel_json / qradar_leef / elastic_ecs / etc. |
| raw_log | string | Vendor-formatted log line (key=value, JSON, LEEF, etc.) |
| source_ip | string | Source IP address |
| dest_ip | string | Destination IP address |
| user | string | User account associated with event |
| process_name | string | Process executable name |
| command_line | string | Command line (truncated) |
| mitre_technique_id | string | T-number (e.g. T1059.001) — empty for benign |
| mitre_tactic | string | ATT&CK tactic category |
| threat_actor_profile | string | benign_user / script_kiddie / insider / apt / nation_state |
| attack_phase | string | 1 of 5 lifecycle phases |
| is_off_hours | int | Boolean — outside 9-17 local |
alert_records.csv (SIEM alerts)
| Column | Type | Description |
|---|---|---|
| alert_id | string | Unique alert identifier |
| triggering_event_id | string | FK to triggering security event |
| host_id | string | FK to host inventory |
| alert_severity | string | info / low / medium / high / critical |
| detection_rule | string | Rule name that fired |
| label_false_positive | int | Boolean — ground-truth FP label |
| suppressed_flag | int | Boolean — alert suppressed |
| ioc_matched | int | Boolean — IOC database match |
| triage_outcome | string | true_positive / false_positive / suppressed / escalated |
incident_summary.csv (per-incident)
| Column | Type | Description |
|---|---|---|
| incident_id | string | Unique incident identifier |
| threat_actor_profile | string | 4-class actor target |
| defender_posture | string | 4-tier defender maturity |
| dwell_time_hours | float | End-to-end attacker dwell |
| lateral_movement_hops | int | Count of lateral movement events |
| exfiltration_attempted_flag | int | Boolean — exfil attempted |
| campaign_success_flag | int | Boolean — campaign succeeded |
| total_events | int | Events generated by this incident |
| total_alerts | int | Alerts triggered |
host_inventory.csv (enterprise hosts)
| Column | Type | Description |
|---|---|---|
| host_id | string | Unique host identifier |
| hostname | string | Hostname |
| os_platform | string | windows / linux / macos / etc. |
| defender_posture | string | minimal / standard / hardened / zero_trust |
| patch_compliance_level | float | Patch compliance score (0–1) |
| ip_address | string | Primary IP |
Suggested Use Cases
- Training SIEM alert triage models — predict true_positive vs false_positive
- MITRE ATT&CK technique classification from raw log lines
- Threat actor attribution — 5-class with realistic class imbalance
- Multi-format log parser training — 8 SIEM vendor formats in one corpus
- Dwell time forecasting under varying defender posture
- Lateral movement detection from event sequences
- C2 beacon detection — periodic vs aperiodic network connections
- IOC matching effectiveness — calibrated 18.5% match rate baseline
- Log tampering detection — APT log-tamper-prob 0.35 baseline
- Off-hours anomaly detection — APT off-hours bias 0.64
Loading the Data
import pandas as pd
events = pd.read_csv("security_events.csv")
alerts = pd.read_csv("alert_records.csv")
incidents = pd.read_csv("incident_summary.csv")
hosts = pd.read_csv("host_inventory.csv")
# Join events to host context
enriched = events.merge(hosts, on="host_id", how="left",
suffixes=("", "_host"))
# Join alerts back to source event and incident
alerts_full = alerts.merge(events, left_on="triggering_event_id",
right_on="event_id", how="left",
suffixes=("_alert", "_event"))
# Multi-class threat actor profile target
y_actor = events["threat_actor_profile"]
# Binary false-positive prediction target
y_fp = alerts["label_false_positive"]
# Multi-class MITRE technique target (filter to malicious events)
malicious = events[events["mitre_technique_id"] != ""]
y_technique = malicious["mitre_technique_id"]
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB010 dataset includes ~550,000 rows across all four files, with calibrated benchmark validation against 6 metrics drawn from authoritative SOC operations and threat intelligence sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb010_sample_2026,
title = {CYB010: Synthetic Security Event Log Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb010-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:37:46 UTC
- Attack lifecycle : 5-phase finite state machine
- Overall benchmark : 95.3 / 100 (grade A)
- Downloads last month
- 9