Dataset Viewer
Auto-converted to Parquet Duplicate
scenario_id
int64
1
50
domain
stringclasses
3 values
situation
stringlengths
13
31
context
stringlengths
3
23
human_thought_process
stringlengths
13
72
possible_mistake
stringlengths
9
25
correct_decision
stringlengths
16
37
risk_level
stringclasses
4 values
explanation
stringlengths
14
35
1
cybersecurity
Multiple failed login attempts
Corporate VPN
Could be user error or brute force. Need to check IP pattern and timing.
Disable all VPN access
Block suspicious IP and alert SOC
medium
Targeted blocking avoids disruption
2
system
Server disk usage suddenly full
Production Linux server
Logs or backups might have grown unexpectedly.
Delete random files
Analyze disk usage and clean safely
high
Blind deletion risks data loss
3
network
High latency reported
Office LAN
Is this congestion, faulty switch, or external issue?
Restart all devices
Trace route and isolate bottleneck
medium
Root cause analysis saves time
4
cybersecurity
Phishing email reported
Employee inbox
Check sender domain and email headers.
Ignore single report
Analyze and warn all users
high
Early warning prevents spread
5
system
CPU spike at night
Cloud VM
Scheduled job or malicious process?
Reboot VM
Check cron jobs and running processes
high
Reboot hides root cause
6
network
Packet loss detected
ISP connection
Could be ISP issue or local cable fault.
Change router immediately
Test locally and contact ISP
medium
Avoid unnecessary replacement
7
cybersecurity
Unknown USB plugged in
Office PC
USB could contain malware.
Open files to check
Isolate system and scan USB
high
USB attacks are common
8
system
Application crashes repeatedly
Production app
Check logs before blaming code.
Redeploy blindly
Inspect error logs
medium
Logs reveal exact issue
9
cybersecurity
Password reuse detected
User audit
User convenience vs security risk.
Ignore minor reuse
Force password reset
medium
Reuse increases breach risk
10
network
WiFi speed drops
Campus WiFi
Too many users or interference?
Increase bandwidth
Change channel and optimize APs
low
Optimization is cheaper
11
cybersecurity
Admin login from new country
Cloud console
Could be travel or compromise.
Disable admin
Verify activity and MFA logs
high
Context matters
12
system
Memory leak suspected
Backend service
Gradual memory growth indicates leak.
Restart service
Profile memory usage
high
Restart is temporary fix
13
network
DNS resolution slow
Internal DNS
Cache or upstream issue?
Switch public DNS
Fix internal DNS config
medium
Internal reliability matters
14
cybersecurity
Ransomware note found
User system
Immediate isolation needed.
Pay ransom
Disconnect system and start IR
critical
Containment is priority
15
system
Backup job failed
Database server
Storage or permission issue?
Ignore single failure
Investigate immediately
high
Backups are critical
16
network
Firewall blocking legit traffic
Enterprise firewall
Rule misconfiguration likely.
Disable firewall
Adjust specific rule
high
Firewall protects network
17
cybersecurity
Suspicious PowerShell script
System logs
PowerShell often abused.
Delete script
Analyze source and intent
high
Forensics needed
18
system
Time drift observed
Distributed system
Clock mismatch affects logs.
Ignore seconds drift
Sync NTP across systems
medium
Time consistency matters
19
network
VPN users disconnected
Remote workforce
Server overload or ISP issue?
Restart VPN server
Check load and logs
medium
Restart may worsen issue
20
cybersecurity
API key exposed in repo
Public GitHub
Key likely compromised.
Do nothing
Revoke and rotate key
critical
Keys must be rotated
21
system
Service dependency missing
Microservices
Config mismatch after deploy.
Rollback immediately
Fix dependency config
medium
Rollback not always needed
22
network
ARP spoofing suspected
LAN network
Unusual MAC-IP mapping.
Ignore alerts
Enable ARP inspection
high
ARP attacks enable MITM
23
cybersecurity
User clicks suspicious link
Office laptop
Endpoint may be compromised.
Scold user
Scan system and educate
medium
Education reduces future risk
24
system
High I/O wait
Database server
Disk bottleneck or query issue.
Add more RAM
Optimize queries or storage
high
Correct resource matters
25
network
Load balancer uneven traffic
Web servers
Health checks misconfigured.
Restart LB
Fix health check rules
medium
Restart hides config issue
26
cybersecurity
Malware detected by AV
Endpoint
False positive or real?
Ignore AV
Quarantine and analyze
high
Ignoring AV is dangerous
27
system
Config file overwritten
Server reboot
Automation tool issue.
Manually edit
Fix automation script
medium
Automation errors repeat
28
network
Port scan detected
Firewall logs
Recon activity likely.
Ignore low volume
Block source and monitor
medium
Early blocking helps
29
cybersecurity
Privilege escalation attempt
Server logs
Serious breach indicator.
Restart server
Investigate immediately
critical
Restart destroys evidence
30
system
Service starts slowly
Application server
Cold start or dependency delay.
Increase CPU
Optimize startup sequence
low
Performance tuning needed
31
network
MTU mismatch issue
VPN tunnel
Fragmentation causing drops.
Ignore small drops
Align MTU settings
medium
MTU mismatch common issue
32
cybersecurity
Social engineering call
Helpdesk
Caller urgency suspicious.
Reset password
Verify identity strictly
high
Social attacks bypass tech
33
system
Database connection timeout
App backend
Pool exhaustion likely.
Restart DB
Increase pool and fix leaks
high
Restart is temporary
34
network
Duplicate IP detected
Office LAN
Static IP conflict.
Restart device
Resolve IP assignment
low
Conflict causes instability
35
cybersecurity
Unusual outbound traffic
Server firewall
Possible data exfiltration.
Ignore off-hours
Analyze destination and volume
critical
Data loss risk
36
system
Log files missing
Server audit
Rotation or tampering?
Assume rotation
Check audit policies
high
Logs are evidence
37
network
Switch port flapping
Data center
Cable or NIC fault.
Ignore alerts
Replace cable/NIC
medium
Hardware issues degrade network
38
cybersecurity
MFA disabled by user
Account settings
Security weakened.
Allow for convenience
Force MFA re-enable
high
MFA is critical
39
system
Kernel panic observed
Linux server
Hardware or driver issue.
Reboot repeatedly
Analyze crash dump
critical
Repeated panic worsens damage
40
network
BGP route change detected
ISP network
Possible hijack.
Ignore brief change
Verify routing integrity
critical
Routing attacks are severe
41
cybersecurity
Unauthorized software installed
Employee PC
Policy violation.
Uninstall silently
Investigate intent
medium
Could be insider threat
42
system
Service health check failing
Monitoring alert
False alert or real issue?
Mute alert
Verify service status
medium
Alerts guide action
43
network
Wireless rogue AP detected
Office
Possible evil twin.
Ignore unknown AP
Locate and remove AP
high
Rogue AP steals data
44
cybersecurity
Email attachment opened
User system
Malware risk.
Wait for symptoms
Scan immediately
high
Early detection helps
45
system
Environment variables missing
App deploy
Config error.
Hardcode values
Fix environment config
medium
Hardcoding is unsafe
46
network
Excessive broadcast traffic
LAN
Loop or misconfig.
Restart switches
Find loop and fix STP
high
Broadcast storms are dangerous
47
cybersecurity
Session hijack suspected
Web app
Token leakage?
Ignore rare case
Invalidate sessions
high
Sessions must be protected
48
system
Cache inconsistency
Distributed cache
Stale data served.
Disable cache
Fix invalidation logic
medium
Cache improves performance
49
network
Slow file transfers
SFTP server
Encryption overhead or disk?
Disable encryption
Optimize disk and cipher
medium
Security should remain
50
cybersecurity
Unknown scheduled task
System audit
Persistence technique.
Ignore if idle
Investigate task origin
high
Persistence enables long attacks
YAML Metadata Warning: empty or missing yaml metadata in repo card (https://huggingface.co/docs/hub/datasets-cards)

Human-Like Reasoning Security Scenarios

A handcrafted dataset of realistic cybersecurity, system, and network scenarios focused on human-style reasoning, not just final answers.

Why this dataset is different

  • Includes human thought processes
  • Covers common mistakes
  • Explains correct decisions
  • Designed for reasoning-based AI models

Domains

  • Cybersecurity
  • Systems
  • Networking

Use Cases

  • LLM fine-tuning
  • AI agent training
  • Cybersecurity education
  • Decision-making simulations

Format

CSV (easily convertible to JSON)

Downloads last month
25