Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 32 new columns ({'retransmission_flag', 'source_ip_hash', 'flow_packets_per_sec', 'bwd_packet_len_mean', 'total_bytes_fwd', 'tcp_flag_ack_count', 'protocol_violation_flag', 'fwd_packet_len_mean', 'inter_arrival_time_mean', 'flow_lifecycle_phase', 'tcp_flag_psh_count', 'tcp_flag_syn_count', 'flow_duration_ms', 'bwd_packet_len_std', 'total_bwd_packets', 'attack_subcategory', 'traffic_category', 'source_device_type', 'total_bytes_bwd', 'tcp_flag_urg_count', 'total_fwd_packets', 'tcp_flag_fin_count', 'flow_start_timestamp', 'label', 'destination_ip_hash', 'inter_arrival_time_std', 'tcp_flag_rst_count', 'attacker_capability_tier', 'flow_bytes_per_sec', 'fragmentation_flag', 'dest_device_type', 'fwd_packet_len_std'}) and 5 missing columns ({'payload_entropy', 'timestamp_offset_ms', 'packet_size_bytes', 'event_type', 'event_severity'}).

This happened while the csv dataset builder was generating data using

hf://datasets/xpertsystems/cyb001-sample/network_flows.csv (at revision 3bed60a9f22d30a3d165c5ad02ec141065be8c92), [/tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv)]

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
                  self._write_table(pa_table, writer_batch_size=writer_batch_size)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              flow_id: string
              session_id: string
              source_ip_hash: string
              destination_ip_hash: string
              source_port: int64
              dest_port: int64
              protocol: string
              flow_start_timestamp: string
              flow_duration_ms: int64
              total_fwd_packets: int64
              total_bwd_packets: int64
              total_bytes_fwd: int64
              total_bytes_bwd: int64
              fwd_packet_len_mean: int64
              fwd_packet_len_std: int64
              bwd_packet_len_mean: int64
              bwd_packet_len_std: int64
              flow_bytes_per_sec: double
              flow_packets_per_sec: double
              inter_arrival_time_mean: double
              inter_arrival_time_std: double
              tcp_flag_syn_count: int64
              tcp_flag_ack_count: int64
              tcp_flag_fin_count: int64
              tcp_flag_rst_count: int64
              tcp_flag_psh_count: int64
              tcp_flag_urg_count: int64
              flow_lifecycle_phase: string
              traffic_category: string
              attack_subcategory: string
              label: string
              segment_id: string
              source_device_type: string
              dest_device_type: string
              attacker_capability_tier: string
              retransmission_flag: int64
              fragmentation_flag: int64
              protocol_violation_flag: int64
              -- schema metadata --
              pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 5266
              to
              {'flow_id': Value('string'), 'session_id': Value('string'), 'event_type': Value('string'), 'timestamp_offset_ms': Value('int64'), 'segment_id': Value('string'), 'source_port': Value('int64'), 'dest_port': Value('int64'), 'protocol': Value('string'), 'packet_size_bytes': Value('int64'), 'payload_entropy': Value('float64'), 'event_severity': Value('string')}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
                  builder.download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
                  self._download_and_prepare(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 32 new columns ({'retransmission_flag', 'source_ip_hash', 'flow_packets_per_sec', 'bwd_packet_len_mean', 'total_bytes_fwd', 'tcp_flag_ack_count', 'protocol_violation_flag', 'fwd_packet_len_mean', 'inter_arrival_time_mean', 'flow_lifecycle_phase', 'tcp_flag_psh_count', 'tcp_flag_syn_count', 'flow_duration_ms', 'bwd_packet_len_std', 'total_bwd_packets', 'attack_subcategory', 'traffic_category', 'source_device_type', 'total_bytes_bwd', 'tcp_flag_urg_count', 'total_fwd_packets', 'tcp_flag_fin_count', 'flow_start_timestamp', 'label', 'destination_ip_hash', 'inter_arrival_time_std', 'tcp_flag_rst_count', 'attacker_capability_tier', 'flow_bytes_per_sec', 'fragmentation_flag', 'dest_device_type', 'fwd_packet_len_std'}) and 5 missing columns ({'payload_entropy', 'timestamp_offset_ms', 'packet_size_bytes', 'event_type', 'event_severity'}).
              
              This happened while the csv dataset builder was generating data using
              
              hf://datasets/xpertsystems/cyb001-sample/network_flows.csv (at revision 3bed60a9f22d30a3d165c5ad02ec141065be8c92), [/tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv)]
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

flow_id
string
session_id
string
event_type
string
timestamp_offset_ms
int64
segment_id
string
source_port
int64
dest_port
int64
protocol
string
packet_size_bytes
int64
payload_entropy
float64
event_severity
string
FLOW_000008990
SESS_00000918
c2_beacon_interval
194,693
SEG_00014
61,950
5,432
HTTPS
279
6.7754
CRITICAL
FLOW_000008990
SESS_00000918
syn_ack_received
52,294
SEG_00014
61,950
5,432
HTTPS
833
3.6877
INFO
FLOW_000008990
SESS_00000918
exfil_burst_detected
199,005
SEG_00014
61,950
5,432
HTTPS
1,208
3.3692
CRITICAL
FLOW_000006992
SESS_00000718
high_entropy_payload
94,766
SEG_00148
42,303
139
TCP
343
5.2362
MEDIUM
FLOW_000006992
SESS_00000718
large_payload_transfer
192,600
SEG_00148
42,303
139
TCP
587
7.7599
MEDIUM
FLOW_000006992
SESS_00000718
fin_sent
238,048
SEG_00148
42,303
139
TCP
61
4.3237
INFO
FLOW_000006992
SESS_00000718
high_entropy_payload
272,254
SEG_00148
42,303
139
TCP
2,572
6.0403
MEDIUM
FLOW_000002838
SESS_00000281
lateral_move_detected
192,717
SEG_00196
51,602
443
HTTPS
2,308
6.8992
CRITICAL
FLOW_000002838
SESS_00000281
lateral_move_detected
30,075
SEG_00196
51,602
443
HTTPS
2,046
5.9369
CRITICAL
FLOW_000002838
SESS_00000281
connection_timeout
153,305
SEG_00196
51,602
443
HTTPS
1,459
5.4749
LOW
FLOW_000002838
SESS_00000281
dns_tunneling_detected
299,383
SEG_00196
51,602
443
HTTPS
220
5.6382
HIGH
FLOW_000004867
SESS_00000502
fin_sent
275,662
SEG_00022
32,013
21
FTP
647
2.5761
INFO
FLOW_000008991
SESS_00000918
c2_beacon_interval
99,075
SEG_00014
1,925
5,432
UDP
2,980
4.586
CRITICAL
FLOW_000008991
SESS_00000918
syn_ack_received
254,702
SEG_00014
1,925
5,432
UDP
104
4.9425
INFO
FLOW_000008991
SESS_00000918
port_reuse_detected
2,634
SEG_00014
1,925
5,432
UDP
2,966
4.9964
LOW
FLOW_000008991
SESS_00000918
lateral_move_detected
169,061
SEG_00014
1,925
5,432
UDP
998
3.5947
CRITICAL
FLOW_000005111
SESS_00000522
port_reuse_detected
221,263
SEG_00029
56,606
25
SMTP
953
4.0863
LOW
FLOW_000002376
SESS_00000233
syn_sent
189,015
SEG_00078
40,573
25
SMTP
960
7.3775
INFO
FLOW_000002376
SESS_00000233
handshake_complete
117,951
SEG_00078
40,573
25
SMTP
107
3.7285
INFO
FLOW_000002376
SESS_00000233
connection_timeout
258,133
SEG_00078
40,573
25
SMTP
1,721
4.0485
LOW
FLOW_000002376
SESS_00000233
lateral_move_detected
257,478
SEG_00078
40,573
25
SMTP
781
5.8239
CRITICAL
FLOW_000007703
SESS_00000793
large_payload_transfer
209,750
SEG_00038
46,101
445
HTTPS
1,082
3.7301
MEDIUM
FLOW_000007703
SESS_00000793
scan_probe_detected
189,282
SEG_00038
46,101
445
HTTPS
3,114
4.7647
HIGH
FLOW_000007703
SESS_00000793
port_reuse_detected
30,880
SEG_00038
46,101
445
HTTPS
1,055
3.3661
LOW
FLOW_000007703
SESS_00000793
lateral_move_detected
285,086
SEG_00038
46,101
445
HTTPS
1,129
5.5574
CRITICAL
FLOW_000009058
SESS_00000921
fin_sent
143,889
SEG_00012
20,269
5,432
TCP
762
5.013
INFO
FLOW_000009058
SESS_00000921
connection_timeout
10,996
SEG_00012
20,269
5,432
TCP
299
4.6898
LOW
FLOW_000009058
SESS_00000921
tunnel_detected
249,074
SEG_00012
20,269
5,432
TCP
1,241
6.9204
HIGH
FLOW_000009058
SESS_00000921
out_of_order_packet
194,535
SEG_00012
20,269
5,432
TCP
1,637
2.856
LOW
FLOW_000007813
SESS_00000805
fragmented_datagram
233,906
SEG_00165
36,020
25
SMTP
2,101
3.2277
LOW
FLOW_000007813
SESS_00000805
data_burst_initiated
161,629
SEG_00165
36,020
25
SMTP
5,410
4.2924
INFO
FLOW_000007813
SESS_00000805
scan_probe_detected
268,628
SEG_00165
36,020
25
SMTP
154
4.937
HIGH
FLOW_000007813
SESS_00000805
out_of_order_packet
118,546
SEG_00165
36,020
25
SMTP
165
3.3494
LOW
FLOW_000007989
SESS_00000817
fin_sent
121,360
SEG_00134
28,923
21
FTP
15,690
5.5848
INFO
FLOW_000007989
SESS_00000817
rst_forced
74,993
SEG_00134
28,923
21
FTP
218
7.3574
MEDIUM
FLOW_000006184
SESS_00000640
out_of_order_packet
220,724
SEG_00013
30,566
19,588
UDP
876
4.9756
LOW
FLOW_000006184
SESS_00000640
protocol_violation
119,338
SEG_00013
30,566
19,588
UDP
1,387
5.2262
MEDIUM
FLOW_000006184
SESS_00000640
out_of_order_packet
80,290
SEG_00013
30,566
19,588
UDP
1,209
3.6636
LOW
FLOW_000006184
SESS_00000640
out_of_order_packet
76,417
SEG_00013
30,566
19,588
UDP
915
6.0908
LOW
FLOW_000007305
SESS_00000747
fin_sent
142,496
SEG_00133
24,655
443
HTTPS
6,926
4.01
INFO
FLOW_000000673
SESS_00000072
tunnel_detected
32,198
SEG_00076
38,292
443
HTTPS
662
4.1042
HIGH
FLOW_000000673
SESS_00000072
connection_timeout
98,979
SEG_00076
38,292
443
HTTPS
1,593
6.272
LOW
FLOW_000006124
SESS_00000634
data_burst_initiated
170,642
SEG_00025
51,054
22
SSH
423
6.3421
INFO
FLOW_000006124
SESS_00000634
protocol_violation
265,688
SEG_00025
51,054
22
SSH
347
5.0866
MEDIUM
FLOW_000006124
SESS_00000634
protocol_violation
252,842
SEG_00025
51,054
22
SSH
1,757
5.2735
MEDIUM
FLOW_000006124
SESS_00000634
syn_sent
11,696
SEG_00025
51,054
22
SSH
528
2.963
INFO
FLOW_000004365
SESS_00000450
scan_probe_detected
76,879
SEG_00052
42,015
21
FTP
263
4.4002
HIGH
FLOW_000003288
SESS_00000343
tunnel_detected
24,782
SEG_00005
24,645
25
SMTP
80
5.0558
HIGH
FLOW_000003288
SESS_00000343
high_entropy_payload
275,365
SEG_00005
24,645
25
SMTP
288
4.0528
MEDIUM
FLOW_000004924
SESS_00000508
out_of_order_packet
264,407
SEG_00099
9,331
53
DNS
3,487
4.1635
LOW
FLOW_000004924
SESS_00000508
bruteforce_sequence
232,531
SEG_00099
9,331
53
DNS
218
3.3215
HIGH
FLOW_000004924
SESS_00000508
bruteforce_sequence
210,039
SEG_00099
9,331
53
DNS
1,448
3.152
HIGH
FLOW_000005943
SESS_00000612
lateral_move_detected
26,717
SEG_00177
56,504
443
TCP
685
6.2145
CRITICAL
FLOW_000005943
SESS_00000612
syn_sent
165,090
SEG_00177
56,504
443
TCP
1,535
6.9343
INFO
FLOW_000002390
SESS_00000235
data_burst_initiated
27,284
SEG_00150
32,211
21
FTP
98
3.48
INFO
FLOW_000002390
SESS_00000235
large_payload_transfer
190,334
SEG_00150
32,211
21
FTP
680
5.9494
MEDIUM
FLOW_000002390
SESS_00000235
connection_timeout
259,215
SEG_00150
32,211
21
FTP
1,674
5.7831
LOW
FLOW_000002390
SESS_00000235
fin_sent
13,180
SEG_00150
32,211
21
FTP
9,735
4.9594
INFO
FLOW_000007792
SESS_00000802
high_entropy_payload
242,104
SEG_00056
58,967
53
DNS
4,952
4.447
MEDIUM
FLOW_000007792
SESS_00000802
data_burst_initiated
295,897
SEG_00056
58,967
53
DNS
454
1.9219
INFO
FLOW_000007792
SESS_00000802
connection_timeout
78,218
SEG_00056
58,967
53
DNS
453
3.4686
LOW
FLOW_000007792
SESS_00000802
port_reuse_detected
142,188
SEG_00056
58,967
53
DNS
362
4.2768
LOW
FLOW_000001919
SESS_00000182
protocol_violation
17,493
SEG_00157
57,246
3,306
TCP
501
5.368
MEDIUM
FLOW_000001919
SESS_00000182
protocol_violation
122,825
SEG_00157
57,246
3,306
TCP
649
5.809
MEDIUM
FLOW_000003852
SESS_00000402
tunnel_detected
178,834
SEG_00013
46,480
80
UDP
517
5.3259
HIGH
FLOW_000003852
SESS_00000402
large_payload_transfer
26,756
SEG_00013
46,480
80
UDP
5,149
6.2373
MEDIUM
FLOW_000003852
SESS_00000402
high_entropy_payload
8,663
SEG_00013
46,480
80
UDP
120
6.9066
MEDIUM
FLOW_000000971
SESS_00000093
large_payload_transfer
95,141
SEG_00079
64,016
139
HTTPS
1,815
5.7193
MEDIUM
FLOW_000007371
SESS_00000754
tunnel_detected
67,409
SEG_00059
56,668
443
UDP
555
5.9861
HIGH
FLOW_000008849
SESS_00000902
data_burst_initiated
221,757
SEG_00067
6,936
5,432
HTTPS
641
5.087
INFO
FLOW_000008849
SESS_00000902
session_hijack_attempt
208,079
SEG_00067
6,936
5,432
HTTPS
891
5.0107
HIGH
FLOW_000008849
SESS_00000902
large_payload_transfer
107,436
SEG_00067
6,936
5,432
HTTPS
656
7.0996
MEDIUM
FLOW_000000220
SESS_00000027
syn_sent
28,260
SEG_00082
40,755
5,820
TCP
1,112
6.3284
INFO
FLOW_000000220
SESS_00000027
rst_forced
273,074
SEG_00082
40,755
5,820
TCP
247
6.2226
MEDIUM
FLOW_000000220
SESS_00000027
rst_forced
130,056
SEG_00082
40,755
5,820
TCP
172
1.8612
MEDIUM
FLOW_000000220
SESS_00000027
rst_forced
183,523
SEG_00082
40,755
5,820
TCP
450
4.2628
MEDIUM
FLOW_000005329
SESS_00000544
exfil_burst_detected
194,889
SEG_00143
10,129
443
UDP
466
4.292
CRITICAL
FLOW_000005329
SESS_00000544
large_payload_transfer
188,042
SEG_00143
10,129
443
UDP
330
2.242
MEDIUM
FLOW_000005329
SESS_00000544
fin_sent
287,808
SEG_00143
10,129
443
UDP
857
6.7459
INFO
FLOW_000005329
SESS_00000544
high_entropy_payload
115,983
SEG_00143
10,129
443
UDP
1,737
7.1338
MEDIUM
FLOW_000005209
SESS_00000533
protocol_violation
197,881
SEG_00004
57,015
123
NTP
660
6.1609
MEDIUM
FLOW_000005209
SESS_00000533
connection_timeout
163,273
SEG_00004
57,015
123
NTP
4,002
3.859
LOW
FLOW_000004124
SESS_00000428
port_reuse_detected
30,211
SEG_00027
25,658
3,306
TCP
2,846
4.5095
LOW
FLOW_000004124
SESS_00000428
protocol_violation
234,512
SEG_00027
25,658
3,306
TCP
2,174
4.2987
MEDIUM
FLOW_000004124
SESS_00000428
protocol_violation
298,903
SEG_00027
25,658
3,306
TCP
204
5.6766
MEDIUM
FLOW_000005139
SESS_00000525
out_of_order_packet
128,478
SEG_00124
8,568
443
HTTPS
818
4.7901
LOW
FLOW_000005139
SESS_00000525
out_of_order_packet
98,178
SEG_00124
8,568
443
HTTPS
182
6.0181
LOW
FLOW_000006356
SESS_00000656
bruteforce_sequence
9,950
SEG_00150
53,319
443
UDP
409
4.9397
HIGH
FLOW_000006766
SESS_00000691
c2_beacon_interval
163,531
SEG_00064
7,236
21
FTP
973
8
CRITICAL
FLOW_000006766
SESS_00000691
handshake_complete
10,062
SEG_00064
7,236
21
FTP
135
3.3226
INFO
FLOW_000006766
SESS_00000691
retransmission_detected
278,805
SEG_00064
7,236
21
FTP
964
5.0623
LOW
FLOW_000001371
SESS_00000135
protocol_violation
42,238
SEG_00179
37,003
443
UDP
457
6.5783
MEDIUM
FLOW_000001371
SESS_00000135
lateral_move_detected
166,047
SEG_00179
37,003
443
UDP
612
6.9269
CRITICAL
FLOW_000001371
SESS_00000135
handshake_complete
293,392
SEG_00179
37,003
443
UDP
5,859
4.7319
INFO
FLOW_000005237
SESS_00000536
tunnel_detected
122,057
SEG_00169
41,526
5,432
TCP
285
2.5983
HIGH
FLOW_000005237
SESS_00000536
port_reuse_detected
132,772
SEG_00169
41,526
5,432
TCP
388
6.0216
LOW
FLOW_000000152
SESS_00000019
tunnel_detected
6,949
SEG_00102
57,582
443
HTTPS
196
3.4289
HIGH
FLOW_000000152
SESS_00000019
scan_probe_detected
233,718
SEG_00102
57,582
443
HTTPS
606
6.9224
HIGH
FLOW_000000152
SESS_00000019
scan_probe_detected
119,718
SEG_00102
57,582
443
HTTPS
5,409
5.7428
HIGH
FLOW_000001187
SESS_00000115
high_entropy_payload
205,107
SEG_00188
8,391
443
HTTPS
274
5.0063
MEDIUM
End of preview.

CYB001 — Synthetic Network Traffic Dataset (Sample)

XpertSystems.ai Synthetic Data Platform · SKU: CYB001-SAMPLE · Version 1.0.0

This is a free preview of the full CYB001 — Synthetic Network Traffic Dataset product. It contains roughly 1 / 60th of the full dataset at identical schema, label distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.

File Rows (sample) Rows (full) Description
network_topology.csv ~200 ~3,200 Network segments and defender configs
session_summary.csv ~1000 ~62,000 Multi-flow session aggregates
network_flows.csv ~9,770 ~500,000 Per-flow records (CICFlowMeter-compatible)
flow_events.csv ~5,431 ~120,000 Per-flow security event records

Dataset Summary

CYB001 simulates 30 days of enterprise network traffic across 9 segment types (corporate LAN, DMZ, cloud workload, OT/ICS, endpoint fleet, SOC management plane, zero-trust, guest Wi-Fi, data centre spine), with:

  • 3-class labels: BENIGN, MALICIOUS, AMBIGUOUS
  • 19 fine-grained traffic categories including portscan, brute-force, SQLi, XSS, exfiltration, C2 beaconing, lateral movement, ransomware staging
  • 4 attacker capability tiers: opportunistic, targeted, APT, insider threat
  • Diurnal traffic patterns with off-peak attack bias for APT/insider tiers
  • APT C2 beacon regularity governed by a configurable IAT coefficient of variation (default 0.065 → regularity score ≈ 0.93)

All IP addresses are SHA-256 pseudonyms (IP_<12 hex>) — no real network data.

Calibrated Benchmark Targets

The full product is calibrated to 12 benchmark metrics; the sample preserves the same calibration. Observed values on this sample:

Test Target Observed Verdict
malicious_flow_rate 0.1720 0.2015 ✓ PASS
c2_beacon_regularity_score 0.7800 0.7673 ✓ PASS
payload_entropy_benign_mean 4.8000 4.8556 ✓ PASS
protocol_violation_rate 0.0150 0.0161 ✓ PASS
scan_probe_density 0.0430 0.0450 ✓ PASS
exfil_volume_ratio 0.0240 0.0153 ✓ PASS
retransmission_rate 0.0380 0.0365 ✓ PASS
dns_query_rate_anomaly 0.0620 0.0620 ✓ PASS
lateral_move_flag_rate 0.0310 0.0340 ✓ PASS
session_risk_score_apt 0.6800 0.6803 ✓ PASS
fwd_bwd_byte_ratio_benign 1.3400 1.4119 ✓ PASS
tunnel_detection_rate 0.0180 0.0180 ✓ PASS

Schema

network_flows.csv (primary file)

Column Type Description
flow_id string Unique flow identifier
session_id string Parent session FK
source_ip_hash string SHA-256 pseudonymised source IP
destination_ip_hash string SHA-256 pseudonymised destination IP
source_port, dest_port int TCP/UDP port numbers
protocol string TCP / UDP / HTTPS / DNS / SMTP / SSH / etc.
flow_start_timestamp string ISO timestamp
flow_duration_ms int Flow duration in milliseconds
total_fwd_packets int Forward packet count
total_bwd_packets int Backward packet count
total_bytes_fwd int Forward byte volume
total_bytes_bwd int Backward byte volume
fwd_packet_len_mean / _std int Forward packet length statistics
bwd_packet_len_mean / _std int Backward packet length statistics
flow_bytes_per_sec float Throughput (bytes/sec)
flow_packets_per_sec float Throughput (packets/sec)
inter_arrival_time_mean/_std float IAT statistics (ms) — key C2 beacon feature
tcp_flag_{syn,ack,fin,rst,psh,urg}_count int TCP flag counts
flow_lifecycle_phase string initiation / handshake / transfer / etc.
traffic_category string 1 of 19 fine-grained categories
attack_subcategory string Attack subcategory (empty for benign)
label string BENIGN / MALICIOUS / AMBIGUOUS (target)
segment_id string FK to network_topology.csv
source_device_type string workstation / server / iot / mobile / cloud
dest_device_type string (same as source)
attacker_capability_tier string opportunistic / targeted / apt / insider
retransmission_flag int TCP retransmission flag
fragmentation_flag int IP fragmentation flag
protocol_violation_flag int Protocol-violation detection flag

See session_summary.csv, network_topology.csv, and flow_events.csv for the complementary aggregate, topology, and per-event schemas.

Suggested Use Cases

  • Training and evaluating network intrusion detection models
  • Benchmarking C2 beacon detection algorithms (regular-IAT signatures)
  • APT behaviour modelling with off-peak temporal bias
  • Multi-class anomaly detection including the AMBIGUOUS class
  • Synthetic-vs-real transfer-learning studies
  • Feature engineering practice with CICFlowMeter-compatible fields

Loading the Data

import pandas as pd

flows    = pd.read_csv("network_flows.csv")
sessions = pd.read_csv("session_summary.csv")
topology = pd.read_csv("network_topology.csv")
events   = pd.read_csv("flow_events.csv")

# Join flows to topology to get defender configuration
flows_enriched = flows.merge(topology, on="segment_id", how="left")

# Binary classification target
y = (flows["label"] == "MALICIOUS").astype(int)

License

This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.

Full Product

The full CYB001 dataset includes ~685,000 rows across all four files, with calibrated A-grade benchmark validation across 12 statistical tests.

📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai

Citation

@dataset{xpertsystems_cyb001_sample_2026,
  title  = {CYB001: Synthetic Network Traffic Dataset (Sample)},
  author = {XpertSystems.ai},
  year   = {2026},
  url    = {https://huggingface.co/datasets/xpertsystems/cyb001-sample}
}

Generation Details

  • Generator version : 1.0.0
  • Random seed : 42
  • Generated : 2026-05-16 13:23:38 UTC
  • Simulation window : 30 days
  • Overall benchmark : 100.0 / 100 (grade A+)
Downloads last month
13