The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 32 new columns ({'retransmission_flag', 'source_ip_hash', 'flow_packets_per_sec', 'bwd_packet_len_mean', 'total_bytes_fwd', 'tcp_flag_ack_count', 'protocol_violation_flag', 'fwd_packet_len_mean', 'inter_arrival_time_mean', 'flow_lifecycle_phase', 'tcp_flag_psh_count', 'tcp_flag_syn_count', 'flow_duration_ms', 'bwd_packet_len_std', 'total_bwd_packets', 'attack_subcategory', 'traffic_category', 'source_device_type', 'total_bytes_bwd', 'tcp_flag_urg_count', 'total_fwd_packets', 'tcp_flag_fin_count', 'flow_start_timestamp', 'label', 'destination_ip_hash', 'inter_arrival_time_std', 'tcp_flag_rst_count', 'attacker_capability_tier', 'flow_bytes_per_sec', 'fragmentation_flag', 'dest_device_type', 'fwd_packet_len_std'}) and 5 missing columns ({'payload_entropy', 'timestamp_offset_ms', 'packet_size_bytes', 'event_type', 'event_severity'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb001-sample/network_flows.csv (at revision 3bed60a9f22d30a3d165c5ad02ec141065be8c92), [/tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
flow_id: string
session_id: string
source_ip_hash: string
destination_ip_hash: string
source_port: int64
dest_port: int64
protocol: string
flow_start_timestamp: string
flow_duration_ms: int64
total_fwd_packets: int64
total_bwd_packets: int64
total_bytes_fwd: int64
total_bytes_bwd: int64
fwd_packet_len_mean: int64
fwd_packet_len_std: int64
bwd_packet_len_mean: int64
bwd_packet_len_std: int64
flow_bytes_per_sec: double
flow_packets_per_sec: double
inter_arrival_time_mean: double
inter_arrival_time_std: double
tcp_flag_syn_count: int64
tcp_flag_ack_count: int64
tcp_flag_fin_count: int64
tcp_flag_rst_count: int64
tcp_flag_psh_count: int64
tcp_flag_urg_count: int64
flow_lifecycle_phase: string
traffic_category: string
attack_subcategory: string
label: string
segment_id: string
source_device_type: string
dest_device_type: string
attacker_capability_tier: string
retransmission_flag: int64
fragmentation_flag: int64
protocol_violation_flag: int64
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 5266
to
{'flow_id': Value('string'), 'session_id': Value('string'), 'event_type': Value('string'), 'timestamp_offset_ms': Value('int64'), 'segment_id': Value('string'), 'source_port': Value('int64'), 'dest_port': Value('int64'), 'protocol': Value('string'), 'packet_size_bytes': Value('int64'), 'payload_entropy': Value('float64'), 'event_severity': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 32 new columns ({'retransmission_flag', 'source_ip_hash', 'flow_packets_per_sec', 'bwd_packet_len_mean', 'total_bytes_fwd', 'tcp_flag_ack_count', 'protocol_violation_flag', 'fwd_packet_len_mean', 'inter_arrival_time_mean', 'flow_lifecycle_phase', 'tcp_flag_psh_count', 'tcp_flag_syn_count', 'flow_duration_ms', 'bwd_packet_len_std', 'total_bwd_packets', 'attack_subcategory', 'traffic_category', 'source_device_type', 'total_bytes_bwd', 'tcp_flag_urg_count', 'total_fwd_packets', 'tcp_flag_fin_count', 'flow_start_timestamp', 'label', 'destination_ip_hash', 'inter_arrival_time_std', 'tcp_flag_rst_count', 'attacker_capability_tier', 'flow_bytes_per_sec', 'fragmentation_flag', 'dest_device_type', 'fwd_packet_len_std'}) and 5 missing columns ({'payload_entropy', 'timestamp_offset_ms', 'packet_size_bytes', 'event_type', 'event_severity'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb001-sample/network_flows.csv (at revision 3bed60a9f22d30a3d165c5ad02ec141065be8c92), [/tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/flow_events.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_flows.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/network_topology.csv), /tmp/hf-datasets-cache/medium/datasets/15434621660449-config-parquet-and-info-xpertsystems-cyb001-sampl-498b196a/hub/datasets--xpertsystems--cyb001-sample/snapshots/3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv (origin=hf://datasets/xpertsystems/cyb001-sample@3bed60a9f22d30a3d165c5ad02ec141065be8c92/session_summary.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
flow_id string | session_id string | event_type string | timestamp_offset_ms int64 | segment_id string | source_port int64 | dest_port int64 | protocol string | packet_size_bytes int64 | payload_entropy float64 | event_severity string |
|---|---|---|---|---|---|---|---|---|---|---|
FLOW_000008990 | SESS_00000918 | c2_beacon_interval | 194,693 | SEG_00014 | 61,950 | 5,432 | HTTPS | 279 | 6.7754 | CRITICAL |
FLOW_000008990 | SESS_00000918 | syn_ack_received | 52,294 | SEG_00014 | 61,950 | 5,432 | HTTPS | 833 | 3.6877 | INFO |
FLOW_000008990 | SESS_00000918 | exfil_burst_detected | 199,005 | SEG_00014 | 61,950 | 5,432 | HTTPS | 1,208 | 3.3692 | CRITICAL |
FLOW_000006992 | SESS_00000718 | high_entropy_payload | 94,766 | SEG_00148 | 42,303 | 139 | TCP | 343 | 5.2362 | MEDIUM |
FLOW_000006992 | SESS_00000718 | large_payload_transfer | 192,600 | SEG_00148 | 42,303 | 139 | TCP | 587 | 7.7599 | MEDIUM |
FLOW_000006992 | SESS_00000718 | fin_sent | 238,048 | SEG_00148 | 42,303 | 139 | TCP | 61 | 4.3237 | INFO |
FLOW_000006992 | SESS_00000718 | high_entropy_payload | 272,254 | SEG_00148 | 42,303 | 139 | TCP | 2,572 | 6.0403 | MEDIUM |
FLOW_000002838 | SESS_00000281 | lateral_move_detected | 192,717 | SEG_00196 | 51,602 | 443 | HTTPS | 2,308 | 6.8992 | CRITICAL |
FLOW_000002838 | SESS_00000281 | lateral_move_detected | 30,075 | SEG_00196 | 51,602 | 443 | HTTPS | 2,046 | 5.9369 | CRITICAL |
FLOW_000002838 | SESS_00000281 | connection_timeout | 153,305 | SEG_00196 | 51,602 | 443 | HTTPS | 1,459 | 5.4749 | LOW |
FLOW_000002838 | SESS_00000281 | dns_tunneling_detected | 299,383 | SEG_00196 | 51,602 | 443 | HTTPS | 220 | 5.6382 | HIGH |
FLOW_000004867 | SESS_00000502 | fin_sent | 275,662 | SEG_00022 | 32,013 | 21 | FTP | 647 | 2.5761 | INFO |
FLOW_000008991 | SESS_00000918 | c2_beacon_interval | 99,075 | SEG_00014 | 1,925 | 5,432 | UDP | 2,980 | 4.586 | CRITICAL |
FLOW_000008991 | SESS_00000918 | syn_ack_received | 254,702 | SEG_00014 | 1,925 | 5,432 | UDP | 104 | 4.9425 | INFO |
FLOW_000008991 | SESS_00000918 | port_reuse_detected | 2,634 | SEG_00014 | 1,925 | 5,432 | UDP | 2,966 | 4.9964 | LOW |
FLOW_000008991 | SESS_00000918 | lateral_move_detected | 169,061 | SEG_00014 | 1,925 | 5,432 | UDP | 998 | 3.5947 | CRITICAL |
FLOW_000005111 | SESS_00000522 | port_reuse_detected | 221,263 | SEG_00029 | 56,606 | 25 | SMTP | 953 | 4.0863 | LOW |
FLOW_000002376 | SESS_00000233 | syn_sent | 189,015 | SEG_00078 | 40,573 | 25 | SMTP | 960 | 7.3775 | INFO |
FLOW_000002376 | SESS_00000233 | handshake_complete | 117,951 | SEG_00078 | 40,573 | 25 | SMTP | 107 | 3.7285 | INFO |
FLOW_000002376 | SESS_00000233 | connection_timeout | 258,133 | SEG_00078 | 40,573 | 25 | SMTP | 1,721 | 4.0485 | LOW |
FLOW_000002376 | SESS_00000233 | lateral_move_detected | 257,478 | SEG_00078 | 40,573 | 25 | SMTP | 781 | 5.8239 | CRITICAL |
FLOW_000007703 | SESS_00000793 | large_payload_transfer | 209,750 | SEG_00038 | 46,101 | 445 | HTTPS | 1,082 | 3.7301 | MEDIUM |
FLOW_000007703 | SESS_00000793 | scan_probe_detected | 189,282 | SEG_00038 | 46,101 | 445 | HTTPS | 3,114 | 4.7647 | HIGH |
FLOW_000007703 | SESS_00000793 | port_reuse_detected | 30,880 | SEG_00038 | 46,101 | 445 | HTTPS | 1,055 | 3.3661 | LOW |
FLOW_000007703 | SESS_00000793 | lateral_move_detected | 285,086 | SEG_00038 | 46,101 | 445 | HTTPS | 1,129 | 5.5574 | CRITICAL |
FLOW_000009058 | SESS_00000921 | fin_sent | 143,889 | SEG_00012 | 20,269 | 5,432 | TCP | 762 | 5.013 | INFO |
FLOW_000009058 | SESS_00000921 | connection_timeout | 10,996 | SEG_00012 | 20,269 | 5,432 | TCP | 299 | 4.6898 | LOW |
FLOW_000009058 | SESS_00000921 | tunnel_detected | 249,074 | SEG_00012 | 20,269 | 5,432 | TCP | 1,241 | 6.9204 | HIGH |
FLOW_000009058 | SESS_00000921 | out_of_order_packet | 194,535 | SEG_00012 | 20,269 | 5,432 | TCP | 1,637 | 2.856 | LOW |
FLOW_000007813 | SESS_00000805 | fragmented_datagram | 233,906 | SEG_00165 | 36,020 | 25 | SMTP | 2,101 | 3.2277 | LOW |
FLOW_000007813 | SESS_00000805 | data_burst_initiated | 161,629 | SEG_00165 | 36,020 | 25 | SMTP | 5,410 | 4.2924 | INFO |
FLOW_000007813 | SESS_00000805 | scan_probe_detected | 268,628 | SEG_00165 | 36,020 | 25 | SMTP | 154 | 4.937 | HIGH |
FLOW_000007813 | SESS_00000805 | out_of_order_packet | 118,546 | SEG_00165 | 36,020 | 25 | SMTP | 165 | 3.3494 | LOW |
FLOW_000007989 | SESS_00000817 | fin_sent | 121,360 | SEG_00134 | 28,923 | 21 | FTP | 15,690 | 5.5848 | INFO |
FLOW_000007989 | SESS_00000817 | rst_forced | 74,993 | SEG_00134 | 28,923 | 21 | FTP | 218 | 7.3574 | MEDIUM |
FLOW_000006184 | SESS_00000640 | out_of_order_packet | 220,724 | SEG_00013 | 30,566 | 19,588 | UDP | 876 | 4.9756 | LOW |
FLOW_000006184 | SESS_00000640 | protocol_violation | 119,338 | SEG_00013 | 30,566 | 19,588 | UDP | 1,387 | 5.2262 | MEDIUM |
FLOW_000006184 | SESS_00000640 | out_of_order_packet | 80,290 | SEG_00013 | 30,566 | 19,588 | UDP | 1,209 | 3.6636 | LOW |
FLOW_000006184 | SESS_00000640 | out_of_order_packet | 76,417 | SEG_00013 | 30,566 | 19,588 | UDP | 915 | 6.0908 | LOW |
FLOW_000007305 | SESS_00000747 | fin_sent | 142,496 | SEG_00133 | 24,655 | 443 | HTTPS | 6,926 | 4.01 | INFO |
FLOW_000000673 | SESS_00000072 | tunnel_detected | 32,198 | SEG_00076 | 38,292 | 443 | HTTPS | 662 | 4.1042 | HIGH |
FLOW_000000673 | SESS_00000072 | connection_timeout | 98,979 | SEG_00076 | 38,292 | 443 | HTTPS | 1,593 | 6.272 | LOW |
FLOW_000006124 | SESS_00000634 | data_burst_initiated | 170,642 | SEG_00025 | 51,054 | 22 | SSH | 423 | 6.3421 | INFO |
FLOW_000006124 | SESS_00000634 | protocol_violation | 265,688 | SEG_00025 | 51,054 | 22 | SSH | 347 | 5.0866 | MEDIUM |
FLOW_000006124 | SESS_00000634 | protocol_violation | 252,842 | SEG_00025 | 51,054 | 22 | SSH | 1,757 | 5.2735 | MEDIUM |
FLOW_000006124 | SESS_00000634 | syn_sent | 11,696 | SEG_00025 | 51,054 | 22 | SSH | 528 | 2.963 | INFO |
FLOW_000004365 | SESS_00000450 | scan_probe_detected | 76,879 | SEG_00052 | 42,015 | 21 | FTP | 263 | 4.4002 | HIGH |
FLOW_000003288 | SESS_00000343 | tunnel_detected | 24,782 | SEG_00005 | 24,645 | 25 | SMTP | 80 | 5.0558 | HIGH |
FLOW_000003288 | SESS_00000343 | high_entropy_payload | 275,365 | SEG_00005 | 24,645 | 25 | SMTP | 288 | 4.0528 | MEDIUM |
FLOW_000004924 | SESS_00000508 | out_of_order_packet | 264,407 | SEG_00099 | 9,331 | 53 | DNS | 3,487 | 4.1635 | LOW |
FLOW_000004924 | SESS_00000508 | bruteforce_sequence | 232,531 | SEG_00099 | 9,331 | 53 | DNS | 218 | 3.3215 | HIGH |
FLOW_000004924 | SESS_00000508 | bruteforce_sequence | 210,039 | SEG_00099 | 9,331 | 53 | DNS | 1,448 | 3.152 | HIGH |
FLOW_000005943 | SESS_00000612 | lateral_move_detected | 26,717 | SEG_00177 | 56,504 | 443 | TCP | 685 | 6.2145 | CRITICAL |
FLOW_000005943 | SESS_00000612 | syn_sent | 165,090 | SEG_00177 | 56,504 | 443 | TCP | 1,535 | 6.9343 | INFO |
FLOW_000002390 | SESS_00000235 | data_burst_initiated | 27,284 | SEG_00150 | 32,211 | 21 | FTP | 98 | 3.48 | INFO |
FLOW_000002390 | SESS_00000235 | large_payload_transfer | 190,334 | SEG_00150 | 32,211 | 21 | FTP | 680 | 5.9494 | MEDIUM |
FLOW_000002390 | SESS_00000235 | connection_timeout | 259,215 | SEG_00150 | 32,211 | 21 | FTP | 1,674 | 5.7831 | LOW |
FLOW_000002390 | SESS_00000235 | fin_sent | 13,180 | SEG_00150 | 32,211 | 21 | FTP | 9,735 | 4.9594 | INFO |
FLOW_000007792 | SESS_00000802 | high_entropy_payload | 242,104 | SEG_00056 | 58,967 | 53 | DNS | 4,952 | 4.447 | MEDIUM |
FLOW_000007792 | SESS_00000802 | data_burst_initiated | 295,897 | SEG_00056 | 58,967 | 53 | DNS | 454 | 1.9219 | INFO |
FLOW_000007792 | SESS_00000802 | connection_timeout | 78,218 | SEG_00056 | 58,967 | 53 | DNS | 453 | 3.4686 | LOW |
FLOW_000007792 | SESS_00000802 | port_reuse_detected | 142,188 | SEG_00056 | 58,967 | 53 | DNS | 362 | 4.2768 | LOW |
FLOW_000001919 | SESS_00000182 | protocol_violation | 17,493 | SEG_00157 | 57,246 | 3,306 | TCP | 501 | 5.368 | MEDIUM |
FLOW_000001919 | SESS_00000182 | protocol_violation | 122,825 | SEG_00157 | 57,246 | 3,306 | TCP | 649 | 5.809 | MEDIUM |
FLOW_000003852 | SESS_00000402 | tunnel_detected | 178,834 | SEG_00013 | 46,480 | 80 | UDP | 517 | 5.3259 | HIGH |
FLOW_000003852 | SESS_00000402 | large_payload_transfer | 26,756 | SEG_00013 | 46,480 | 80 | UDP | 5,149 | 6.2373 | MEDIUM |
FLOW_000003852 | SESS_00000402 | high_entropy_payload | 8,663 | SEG_00013 | 46,480 | 80 | UDP | 120 | 6.9066 | MEDIUM |
FLOW_000000971 | SESS_00000093 | large_payload_transfer | 95,141 | SEG_00079 | 64,016 | 139 | HTTPS | 1,815 | 5.7193 | MEDIUM |
FLOW_000007371 | SESS_00000754 | tunnel_detected | 67,409 | SEG_00059 | 56,668 | 443 | UDP | 555 | 5.9861 | HIGH |
FLOW_000008849 | SESS_00000902 | data_burst_initiated | 221,757 | SEG_00067 | 6,936 | 5,432 | HTTPS | 641 | 5.087 | INFO |
FLOW_000008849 | SESS_00000902 | session_hijack_attempt | 208,079 | SEG_00067 | 6,936 | 5,432 | HTTPS | 891 | 5.0107 | HIGH |
FLOW_000008849 | SESS_00000902 | large_payload_transfer | 107,436 | SEG_00067 | 6,936 | 5,432 | HTTPS | 656 | 7.0996 | MEDIUM |
FLOW_000000220 | SESS_00000027 | syn_sent | 28,260 | SEG_00082 | 40,755 | 5,820 | TCP | 1,112 | 6.3284 | INFO |
FLOW_000000220 | SESS_00000027 | rst_forced | 273,074 | SEG_00082 | 40,755 | 5,820 | TCP | 247 | 6.2226 | MEDIUM |
FLOW_000000220 | SESS_00000027 | rst_forced | 130,056 | SEG_00082 | 40,755 | 5,820 | TCP | 172 | 1.8612 | MEDIUM |
FLOW_000000220 | SESS_00000027 | rst_forced | 183,523 | SEG_00082 | 40,755 | 5,820 | TCP | 450 | 4.2628 | MEDIUM |
FLOW_000005329 | SESS_00000544 | exfil_burst_detected | 194,889 | SEG_00143 | 10,129 | 443 | UDP | 466 | 4.292 | CRITICAL |
FLOW_000005329 | SESS_00000544 | large_payload_transfer | 188,042 | SEG_00143 | 10,129 | 443 | UDP | 330 | 2.242 | MEDIUM |
FLOW_000005329 | SESS_00000544 | fin_sent | 287,808 | SEG_00143 | 10,129 | 443 | UDP | 857 | 6.7459 | INFO |
FLOW_000005329 | SESS_00000544 | high_entropy_payload | 115,983 | SEG_00143 | 10,129 | 443 | UDP | 1,737 | 7.1338 | MEDIUM |
FLOW_000005209 | SESS_00000533 | protocol_violation | 197,881 | SEG_00004 | 57,015 | 123 | NTP | 660 | 6.1609 | MEDIUM |
FLOW_000005209 | SESS_00000533 | connection_timeout | 163,273 | SEG_00004 | 57,015 | 123 | NTP | 4,002 | 3.859 | LOW |
FLOW_000004124 | SESS_00000428 | port_reuse_detected | 30,211 | SEG_00027 | 25,658 | 3,306 | TCP | 2,846 | 4.5095 | LOW |
FLOW_000004124 | SESS_00000428 | protocol_violation | 234,512 | SEG_00027 | 25,658 | 3,306 | TCP | 2,174 | 4.2987 | MEDIUM |
FLOW_000004124 | SESS_00000428 | protocol_violation | 298,903 | SEG_00027 | 25,658 | 3,306 | TCP | 204 | 5.6766 | MEDIUM |
FLOW_000005139 | SESS_00000525 | out_of_order_packet | 128,478 | SEG_00124 | 8,568 | 443 | HTTPS | 818 | 4.7901 | LOW |
FLOW_000005139 | SESS_00000525 | out_of_order_packet | 98,178 | SEG_00124 | 8,568 | 443 | HTTPS | 182 | 6.0181 | LOW |
FLOW_000006356 | SESS_00000656 | bruteforce_sequence | 9,950 | SEG_00150 | 53,319 | 443 | UDP | 409 | 4.9397 | HIGH |
FLOW_000006766 | SESS_00000691 | c2_beacon_interval | 163,531 | SEG_00064 | 7,236 | 21 | FTP | 973 | 8 | CRITICAL |
FLOW_000006766 | SESS_00000691 | handshake_complete | 10,062 | SEG_00064 | 7,236 | 21 | FTP | 135 | 3.3226 | INFO |
FLOW_000006766 | SESS_00000691 | retransmission_detected | 278,805 | SEG_00064 | 7,236 | 21 | FTP | 964 | 5.0623 | LOW |
FLOW_000001371 | SESS_00000135 | protocol_violation | 42,238 | SEG_00179 | 37,003 | 443 | UDP | 457 | 6.5783 | MEDIUM |
FLOW_000001371 | SESS_00000135 | lateral_move_detected | 166,047 | SEG_00179 | 37,003 | 443 | UDP | 612 | 6.9269 | CRITICAL |
FLOW_000001371 | SESS_00000135 | handshake_complete | 293,392 | SEG_00179 | 37,003 | 443 | UDP | 5,859 | 4.7319 | INFO |
FLOW_000005237 | SESS_00000536 | tunnel_detected | 122,057 | SEG_00169 | 41,526 | 5,432 | TCP | 285 | 2.5983 | HIGH |
FLOW_000005237 | SESS_00000536 | port_reuse_detected | 132,772 | SEG_00169 | 41,526 | 5,432 | TCP | 388 | 6.0216 | LOW |
FLOW_000000152 | SESS_00000019 | tunnel_detected | 6,949 | SEG_00102 | 57,582 | 443 | HTTPS | 196 | 3.4289 | HIGH |
FLOW_000000152 | SESS_00000019 | scan_probe_detected | 233,718 | SEG_00102 | 57,582 | 443 | HTTPS | 606 | 6.9224 | HIGH |
FLOW_000000152 | SESS_00000019 | scan_probe_detected | 119,718 | SEG_00102 | 57,582 | 443 | HTTPS | 5,409 | 5.7428 | HIGH |
FLOW_000001187 | SESS_00000115 | high_entropy_payload | 205,107 | SEG_00188 | 8,391 | 443 | HTTPS | 274 | 5.0063 | MEDIUM |
CYB001 — Synthetic Network Traffic Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB001-SAMPLE · Version 1.0.0
This is a free preview of the full CYB001 — Synthetic Network Traffic Dataset product. It contains roughly 1 / 60th of the full dataset at identical schema, label distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
network_topology.csv |
~200 | ~3,200 | Network segments and defender configs |
session_summary.csv |
~1000 | ~62,000 | Multi-flow session aggregates |
network_flows.csv |
~9,770 | ~500,000 | Per-flow records (CICFlowMeter-compatible) |
flow_events.csv |
~5,431 | ~120,000 | Per-flow security event records |
Dataset Summary
CYB001 simulates 30 days of enterprise network traffic across 9 segment types (corporate LAN, DMZ, cloud workload, OT/ICS, endpoint fleet, SOC management plane, zero-trust, guest Wi-Fi, data centre spine), with:
- 3-class labels:
BENIGN,MALICIOUS,AMBIGUOUS - 19 fine-grained traffic categories including portscan, brute-force, SQLi, XSS, exfiltration, C2 beaconing, lateral movement, ransomware staging
- 4 attacker capability tiers: opportunistic, targeted, APT, insider threat
- Diurnal traffic patterns with off-peak attack bias for APT/insider tiers
- APT C2 beacon regularity governed by a configurable IAT coefficient of variation (default 0.065 → regularity score ≈ 0.93)
All IP addresses are SHA-256 pseudonyms (IP_<12 hex>) — no real network data.
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark metrics; the sample preserves the same calibration. Observed values on this sample:
| Test | Target | Observed | Verdict |
|---|---|---|---|
| malicious_flow_rate | 0.1720 | 0.2015 | ✓ PASS |
| c2_beacon_regularity_score | 0.7800 | 0.7673 | ✓ PASS |
| payload_entropy_benign_mean | 4.8000 | 4.8556 | ✓ PASS |
| protocol_violation_rate | 0.0150 | 0.0161 | ✓ PASS |
| scan_probe_density | 0.0430 | 0.0450 | ✓ PASS |
| exfil_volume_ratio | 0.0240 | 0.0153 | ✓ PASS |
| retransmission_rate | 0.0380 | 0.0365 | ✓ PASS |
| dns_query_rate_anomaly | 0.0620 | 0.0620 | ✓ PASS |
| lateral_move_flag_rate | 0.0310 | 0.0340 | ✓ PASS |
| session_risk_score_apt | 0.6800 | 0.6803 | ✓ PASS |
| fwd_bwd_byte_ratio_benign | 1.3400 | 1.4119 | ✓ PASS |
| tunnel_detection_rate | 0.0180 | 0.0180 | ✓ PASS |
Schema
network_flows.csv (primary file)
| Column | Type | Description |
|---|---|---|
| flow_id | string | Unique flow identifier |
| session_id | string | Parent session FK |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| destination_ip_hash | string | SHA-256 pseudonymised destination IP |
| source_port, dest_port | int | TCP/UDP port numbers |
| protocol | string | TCP / UDP / HTTPS / DNS / SMTP / SSH / etc. |
| flow_start_timestamp | string | ISO timestamp |
| flow_duration_ms | int | Flow duration in milliseconds |
| total_fwd_packets | int | Forward packet count |
| total_bwd_packets | int | Backward packet count |
| total_bytes_fwd | int | Forward byte volume |
| total_bytes_bwd | int | Backward byte volume |
| fwd_packet_len_mean / _std | int | Forward packet length statistics |
| bwd_packet_len_mean / _std | int | Backward packet length statistics |
| flow_bytes_per_sec | float | Throughput (bytes/sec) |
| flow_packets_per_sec | float | Throughput (packets/sec) |
| inter_arrival_time_mean/_std | float | IAT statistics (ms) — key C2 beacon feature |
| tcp_flag_{syn,ack,fin,rst,psh,urg}_count | int | TCP flag counts |
| flow_lifecycle_phase | string | initiation / handshake / transfer / etc. |
| traffic_category | string | 1 of 19 fine-grained categories |
| attack_subcategory | string | Attack subcategory (empty for benign) |
| label | string | BENIGN / MALICIOUS / AMBIGUOUS (target) |
| segment_id | string | FK to network_topology.csv |
| source_device_type | string | workstation / server / iot / mobile / cloud |
| dest_device_type | string | (same as source) |
| attacker_capability_tier | string | opportunistic / targeted / apt / insider |
| retransmission_flag | int | TCP retransmission flag |
| fragmentation_flag | int | IP fragmentation flag |
| protocol_violation_flag | int | Protocol-violation detection flag |
See session_summary.csv, network_topology.csv, and flow_events.csv for
the complementary aggregate, topology, and per-event schemas.
Suggested Use Cases
- Training and evaluating network intrusion detection models
- Benchmarking C2 beacon detection algorithms (regular-IAT signatures)
- APT behaviour modelling with off-peak temporal bias
- Multi-class anomaly detection including the
AMBIGUOUSclass - Synthetic-vs-real transfer-learning studies
- Feature engineering practice with CICFlowMeter-compatible fields
Loading the Data
import pandas as pd
flows = pd.read_csv("network_flows.csv")
sessions = pd.read_csv("session_summary.csv")
topology = pd.read_csv("network_topology.csv")
events = pd.read_csv("flow_events.csv")
# Join flows to topology to get defender configuration
flows_enriched = flows.merge(topology, on="segment_id", how="left")
# Binary classification target
y = (flows["label"] == "MALICIOUS").astype(int)
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB001 dataset includes ~685,000 rows across all four files, with calibrated A-grade benchmark validation across 12 statistical tests.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb001_sample_2026,
title = {CYB001: Synthetic Network Traffic Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb001-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 13:23:38 UTC
- Simulation window : 30 days
- Overall benchmark : 100.0 / 100 (grade A+)
- Downloads last month
- 13