Dataset Viewer
Auto-converted to Parquet Duplicate
sample_id
int64
1
16
file_name
stringlengths
27
46
category
stringclasses
1 value
label
stringclasses
2 values
description
stringlengths
28
85
source
stringclasses
1 value
type
stringclasses
3 values
1
files/fraud_account_transactions.xlsx
online_fraud
positive
Transaction records of accounts used for fraudulent activities
synthetic
str
2
files/tel_suspect_call_center_logs.xlsx
online_fraud
negative
Call log data of the suspect
synthetic
str
3
files/cims_ip_list_101_em515.xlsx
online_fraud
positive
Start and end times of investigation for suspicious PC IP addresses (Log 101)
synthetic
int
4
files/cims_ip_list_102_em515.xlsx
online_fraud
negative
Start and end times of investigation for suspicious PC IP addresses (Log 102)
synthetic
int
5
files/cims_ip_list_103_em515.xlsx
online_fraud
positive
Start and end times of investigation for suspicious PC IP addresses (Log 103)
synthetic
int
6
files/cims_ip_list_104_em515.xlsx
online_fraud
negative
Start and end times of investigation for suspicious PC IP addresses (Log 104)
synthetic
int
7
files/cims_ip_list_105_em515.xlsx
online_fraud
positive
Start and end times of investigation for suspicious PC IP addresses (Log 105)
synthetic
int
8
files/suspect_phone_call_and_data_usage.xlsx
online_fraud
positive
Communication logs for the suspicious number (010-8457-3455)
synthetic
str
9
files/secondary_account_atm_withdrawals.xlsx
online_fraud
positive
ATM location information for cash withdrawals from the crime-related account
synthetic
str
10
files/suspect_phone_call_locations.xlsx
online_fraud
positive
Outgoing call location information for the suspicious number (010-8457-3455)
synthetic
str
11
files/phone_atm_location_matching_results.xlsx
online_fraud
positive
Matching results between the suspicious number's location and ATM withdrawal location
synthetic
str
12
files/phone_atm_location_matching_map.html
online_fraud
positive
Map visualization of matching results between the suspicious number and ATM location
synthetic
str
13
files/realtime_sms_logs.txt
online_fraud
positive
Outgoing SMS location information of the suspect
synthetic
str
14
files/fault_tracker_user_manual.pdf
online_fraud
negative
User manual for the location tracking program (PoleTracker)
synthetic
pdf
15
files/google_cloud_access_logs.xlsx
online_fraud
positive
Google Cloud access logs categorized by phone number
synthetic
str
16
files/money_mule_telegram_analysis.xlsx
online_fraud
positive
Telegram chat logs of the cash-out agent containing criminal instructions
synthetic
str

Digital Forensic Investigation Scenario Dataset (Online Fraud)

This dataset is a structured collection of digital evidence for research in digital forensics and criminal investigation. It simulates a multi-stage Online Fraud (Voice Phishing) scenario. All metadata and evidence linkages are defined in the accompanying metadata.csv file.

Dataset Structure

The dataset features follow the exact structure of the provided metadata file, ensuring data integrity and consistency for research purposes.

Metadata Features

  • sample_id: Unique identifier for each data record.
  • file_name: Standardized dataset file name.
  • category: Criminal category classification (online_fraud).
  • label: Investigative relevance (positive / negative).
  • description: Detailed role of the evidence in the investigation scenario.
  • source: Data generation origin (synthetic).
  • type: Data format or type (e.g., str, int, pdf).

Evidence Inventory

sample_id file_name category label description source type
1 fraud_account_transactions.xlsx online_fraud positive Transaction records of accounts used for fraudulent activities synthetic str
2 tel_suspect_call_center_logs.xlsx online_fraud negative Call log data of the suspect synthetic str
3 cims_ip_list_101_em515.xlsx online_fraud positive Start and end times of investigation for suspicious PC IP addresses (Log 101) synthetic int
4 cims_ip_list_102_em515.xlsx online_fraud negative Start and end times of investigation for suspicious PC IP addresses (Log 102) synthetic int
5 cims_ip_list_103_em515.xlsx online_fraud positive Start and end times of investigation for suspicious PC IP addresses (Log 103) synthetic int
6 cims_ip_list_104_em515.xlsx online_fraud negative Start and end times of investigation for suspicious PC IP addresses (Log 104) synthetic int
7 cims_ip_list_105_em515.xlsx online_fraud positive Start and end times of investigation for suspicious PC IP addresses (Log 105) synthetic int
8 suspect_phone_call_and_data_usage.xlsx online_fraud positive Communication logs for the suspicious number (010-8457-3455) synthetic str
9 secondary_account_atm_withdrawals.xlsx online_fraud positive ATM location information for cash withdrawals from the crime-related account synthetic str
10 suspect_phone_call_locations.xlsx online_fraud positive Outgoing call location information for the suspicious number (010-8457-3455) synthetic str
11 phone_atm_location_matching_results.xlsx online_fraud positive Matching results between the suspicious number's location and ATM withdrawal location synthetic str
12 phone_atm_location_matching_map.html online_fraud positive Map visualization of matching results between the suspicious number and ATM location synthetic str
13 realtime_sms_logs.txt online_fraud positive Outgoing SMS location information of the suspect synthetic str
14 fault_tracker_user_manual.pdf online_fraud negative User manual for the location tracking program (PoleTracker) synthetic pdf
15 google_cloud_access_logs.xlsx online_fraud positive Google Cloud access logs categorized by phone number synthetic str
16 money_mule_telegram_analysis.xlsx online_fraud positive Telegram chat logs of the cash-out agent containing criminal instructions synthetic str

Project Information

This dataset is a result of the Glocal University 30 Project, supported by the Ministry of Education and the National Research Foundation of Korea. It was developed at the Hallym Intelligent Social Safety Research Lab.

License

Distributed under the CC BY NC ND 4.0 license.


๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์ˆ˜์‚ฌ ์‹œ๋‚˜๋ฆฌ์˜ค ๋ฐ์ดํ„ฐ์…‹ (Online Fraud)

์†Œ๊ฐœ

๋ณธ ๋ฐ์ดํ„ฐ์…‹์€ ๊ฐ€์ƒ์˜ ์˜จ๋ผ์ธ ์‚ฌ๊ธฐ ์‚ฌ๊ฑด์„ ์ˆ˜์‚ฌํ•˜๋Š” ๊ณผ์ •์„ ์žฌ๊ตฌ์„ฑํ•œ ์—ฐ๊ตฌ์šฉ ๋ฐ์ดํ„ฐ์ž…๋‹ˆ๋‹ค. ์—…๋กœ๋“œ๋œ metadata.csv์˜ ๊ทœ๊ฒฉ์— ๋”ฐ๋ผ ๋ชจ๋“  ๋ฐ์ดํ„ฐ ํŒŒ์ผ์ด ์ •์˜๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ˆ˜์‚ฌ์  ์œ ์˜๋ฏธ์„ฑ(label)๊ณผ ๋ฐ์ดํ„ฐ ํ˜•์‹(type)์„ ์‹ค์ œ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ์™€ 1:1๋กœ ๋งค์นญํ•˜์—ฌ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.

๋ฐ์ดํ„ฐ ๋ช…์„ธ

์ œ๊ณตํ•ด์ฃผ์‹  metadata.csv์˜ ์ปฌ๋Ÿผ ๊ตฌ์กฐ๋ฅผ ๊ทธ๋Œ€๋กœ ๋ฐ˜์˜ํ•˜์˜€์Šต๋‹ˆ๋‹ค.

  • sample_id: ๋ฐ์ดํ„ฐ ๊ณ ์œ  ์‹๋ณ„ ๋ฒˆํ˜ธ
  • file_name: ํ‘œ์ค€ ์˜๋ฌธ ํŒŒ์ผ๋ช…
  • category: ๋ฒ”์ฃ„ ๋ถ„๋ฅ˜ (online_fraud)
  • label: ์ˆ˜์‚ฌ ์œ ์˜๋ฏธ์„ฑ (positive: ํ•ต์‹ฌ ์ฆ๊ฑฐ, negative: ์ฐธ๊ณ ์šฉ ๋ฐ์ดํ„ฐ)
  • description: ์‹œ๋‚˜๋ฆฌ์˜ค ๋‚ด ํ•ด๋‹น ํŒŒ์ผ์˜ ์ˆ˜์‚ฌ์  ์˜๋ฏธ ๋ฐ ์—ญํ•  (์˜๋ฌธ ์„ค๋ช…)
  • source: ๋ฐ์ดํ„ฐ ์ƒ์„ฑ ์ถœ์ฒ˜ (synthetic)
  • type: ๋ฐ์ดํ„ฐ ๊ธฐ์ˆ  ํ˜•์‹ (str, int, pdf ๋“ฑ)

๋ผ์ด์„ ์Šค

๋ณธ ๋ฐ์ดํ„ฐ์…‹์€ CC BY NC ND 4.0 ๋ผ์ด์„ ์Šค๋ฅผ ๋”ฐ๋ฆ…๋‹ˆ๋‹ค. ์ถœ์ฒ˜ ๋ช…์‹œ ์‹œ ๋น„์˜๋ฆฌ ๋ชฉ์ ์˜ ๊ต์œก ๋ฐ ์—ฐ๊ตฌ ์šฉ๋„๋กœ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.

์†Œ์†: ํ•œ๋ฆผ๋Œ€ํ•™๊ต ์ง€๋Šฅํ˜•์‚ฌํšŒ์•ˆ์ „์—ฐ๊ตฌ์†Œ (Hallym Intelligent Social Safety Research Lab)

Downloads last month
37