incident_id int64 1 50 | system_type stringlengths 7 21 | signal_strength stringclasses 3
values | anomaly_type stringlengths 7 21 | human_pressure_level stringclasses 3
values | past_similar_cases stringclasses 2
values | initial_human_thought stringlengths 10 25 | reasoning_summary stringlengths 15 44 | final_decision stringlengths 6 21 | decision_confidence float64 0.5 0.99 |
|---|---|---|---|---|---|---|---|---|---|
1 | Corporate Email | Medium | Suspicious attachment | Low | Yes | Could be phishing | Attachment resembles known phishing patterns | Quarantine email | 0.91 |
2 | Cloud Server | Strong | Unauthorized access | High | Yes | Critical breach | Login from unknown region with admin account | Isolate server | 0.96 |
3 | Mobile App | Weak | Login delay | Low | No | Probably network issue | No repeated malicious indicators | Monitor only | 0.62 |
4 | Payment Gateway | Strong | Transaction anomaly | High | Yes | Fraud likely | Multiple high-value transactions in seconds | Block transactions | 0.94 |
5 | Healthcare System | Medium | Data access spike | Medium | Yes | Possible misuse | Non-duty hour access to patient data | Audit user activity | 0.89 |
6 | University Network | Weak | Port scan | Low | No | Student experiment | Scan limited and non-aggressive | Log event | 0.58 |
7 | E-commerce Platform | Strong | Bot traffic | Medium | Yes | Automated attack | Pattern matches known bots | Enable bot mitigation | 0.93 |
8 | Corporate VPN | Medium | Concurrent login | High | Yes | Credential leak suspected | Impossible travel scenario | Force password reset | 0.92 |
9 | IoT Network | Weak | Device disconnect | Low | No | Hardware issue | No threat indicators observed | Ignore | 0.55 |
10 | Social Media Platform | Strong | Account takeover | High | Yes | Confirmed breach | Password changed from new IP | Lock account | 0.95 |
11 | Financial System | Medium | Policy violation | Medium | Yes | Insider risk | Repeated access to restricted files | Notify compliance | 0.88 |
12 | Cloud Storage | Strong | Mass download | High | Yes | Data exfiltration | Large data pulled rapidly | Revoke access | 0.97 |
13 | HR System | Weak | Login retry | Low | No | User mistake | Few retries without pattern | No action | 0.52 |
14 | Web Server | Medium | SQL injection attempt | Medium | Yes | Attack probe detected | Suspicious query patterns | Block IP | 0.9 |
15 | Industrial Control | Strong | Command override | High | Yes | Severe risk | Unauthorized command execution | Shutdown system | 0.98 |
16 | Corporate Chat | Weak | Unknown link | Low | No | Probably safe | No malicious reputation | Warn user | 0.6 |
17 | Retail POS | Medium | Card mismatch | Medium | Yes | Fraud suspicion | Location mismatch detected | Flag transaction | 0.87 |
18 | DevOps Pipeline | Strong | Code tampering | High | Yes | Supply chain risk | Unexpected commit detected | Rollback deployment | 0.96 |
19 | School Portal | Weak | Multiple logins | Low | No | Shared device issue | Normal school hours | Monitor | 0.59 |
20 | Email Gateway | Strong | Malware signature | High | Yes | Confirmed malware | Hash matches malware DB | Delete email | 0.99 |
21 | CRM System | Medium | API abuse | Medium | Yes | Automation misuse | Excessive API calls | Throttle access | 0.85 |
22 | Streaming Platform | Weak | Buffer anomaly | Low | No | Performance issue | No security flags | Ignore | 0.5 |
23 | Smart Home Hub | Medium | Unauthorized pairing | Medium | No | Potential intrusion | Unknown device detected | Block device | 0.86 |
24 | Corporate WiFi | Strong | Rogue AP | High | Yes | Active attack | Fake AP detected | Disable access point | 0.95 |
25 | Log Server | Weak | Log gap | Low | No | System delay | No correlated events | No action | 0.54 |
26 | Banking App | Strong | Rooted device login | High | Yes | High fraud risk | Root access detected | Deny login | 0.94 |
27 | Video Conference | Medium | Session hijack | Medium | Yes | Privacy risk | Unexpected participant join | Terminate session | 0.89 |
28 | Inventory System | Weak | Stock mismatch | Low | No | Sync error suspected | No malicious behavior | Investigate later | 0.57 |
29 | Travel Portal | Strong | Location spoofing | High | Yes | Fraud attempt | VPN abuse detected | Block account | 0.93 |
30 | Ad Platform | Medium | Click fraud | Medium | Yes | Suspicious behavior | Automated clicking pattern | Blacklist IPs | 0.88 |
31 | Smart Meter | Weak | Data delay | Low | No | Connectivity issue | No intrusion signals | Ignore | 0.51 |
32 | Government Portal | Strong | Identity spoofing | High | Yes | Serious breach | Fake documents uploaded | Freeze application | 0.97 |
33 | Forum Website | Weak | Spam post | Low | No | Normal spam | Basic spam behavior | Delete post | 0.56 |
34 | AI Model API | Medium | Prompt abuse | Medium | Yes | Policy evasion attempt | Repeated boundary probing | Rate limit user | 0.84 |
35 | Logistics System | Strong | Route manipulation | High | Yes | Operational sabotage | Unauthorized changes detected | Rollback routes | 0.96 |
36 | Learning Platform | Weak | Quiz cheating | Low | No | Student behavior | Minor violation | Warn student | 0.53 |
37 | Stock Trading App | Strong | Market manipulation | High | Yes | Illegal activity | Abnormal order patterns | Freeze trades | 0.98 |
38 | Messaging App | Medium | Mass invites | Medium | Yes | Spam campaign | Invite velocity abnormal | Restrict account | 0.87 |
39 | Payroll System | Weak | Salary mismatch | Low | No | Input error | No malicious intent | Manual correction | 0.55 |
40 | News Website | Medium | Traffic surge | Medium | Yes | Possible DDoS | Traffic pattern unusual | Enable rate limiting | 0.86 |
41 | IoT Camera | Strong | Remote access | High | Yes | Privacy breach | Unknown external access | Disable camera | 0.95 |
42 | Cloud Console | Medium | Permission escalation | Medium | Yes | Privilege abuse | Risk escalation observed | Revoke permissions | 0.9 |
43 | Forum Admin Panel | Weak | Failed login | Low | No | Typing error | Single attempt only | No action | 0.5 |
44 | Search Engine Ads | Medium | Ad fraud | Medium | Yes | Suspicious spend | CTR anomaly detected | Suspend campaign | 0.88 |
45 | Airport System | Strong | Security override | High | Yes | Critical threat | Unauthorized override detected | Emergency shutdown | 0.99 |
46 | Chatbot System | Weak | Odd response | Low | No | Model glitch suspected | No abuse evidence | Monitor | 0.52 |
47 | CRM API | Medium | Token misuse | Medium | Yes | Access risk | Token shared externally | Revoke token | 0.89 |
48 | Cloud Backup | Strong | Deletion attempt | High | Yes | Ransomware signal | Mass delete initiated | Lock backups | 0.97 |
49 | Game Server | Weak | Latency spike | Low | No | Load issue | No malicious indicators | Ignore | 0.51 |
50 | Enterprise IAM | Strong | Privilege escalation | High | Yes | Major breach risk | Unauthorized role assignment | Revert and alert SOC | 0.98 |
YAML Metadata Warning:empty or missing yaml metadata in repo card
Check out the documentation for more information.
Human-Style Cyber Incident Judgment Dataset
π Overview
This dataset represents human-like reasoning in cybersecurity incident response.
Each entry simulates how a security analyst thinks, reasons, and decides under different levels of pressure and risk.
Unlike traditional datasets that focus on logs or alerts, this dataset focuses on:
- intuition
- contextual reasoning
- experience-based judgment
- confidence in decision-making
π§ Uniqueness
- Fully synthetic and original
- Not copied or derived from real logs
- Designed manually for AI reasoning research
- Focuses on human decision process, not automation
π Dataset Structure
Each row represents a single simulated cyber incident.
Columns
incident_idβ Unique identifiersystem_typeβ Affected system or platformsignal_strengthβ Weak / Medium / Stronganomaly_typeβ Type of suspicious activityhuman_pressure_levelβ Analyst stress levelpast_similar_casesβ Prior experience indicatorinitial_human_thoughtβ First intuitive reactionreasoning_summaryβ Explanation behind the decisionfinal_decisionβ Action takendecision_confidenceβ Confidence score (0β1)
π― Intended Use
- Explainable AI (XAI)
- Cybersecurity research
- SOC analyst simulation
- AI/ML reasoning models
- Educational and academic projects
π License
This dataset is released under CC0 1.0 (Public Domain).
You are free to:
- Use
- Modify
- Distribute
- Build commercial or non-commercial projects
No attribution is required.
β οΈ Disclaimer
This dataset is synthetic and does not contain real user data, real systems, or sensitive information.
Any resemblance to real incidents is purely coincidental.
- Downloads last month
- 6