The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 10 new columns ({'application_id', 'risk_score_delta', 'session_id', 'user_id', 'event_id', 'source_domain_id', 'event_timestamp_utc', 'event_type', 'target_account_id', 'target_domain_id'}) and 21 missing columns ({'lateral_move_count', 'credential_harvest_count', 'attack_phase', 'actor_capability_tier', 'files_encrypted_cumulative', 'living_off_land_score', 'encryption_throughput_mbps', 'timestep', 'c2_bytes_exfiltrated', 'blast_radius_pct', 'wiper_flag', 'actor_id', 'attribution_risk_score', 'campaign_id', 'defender_alert_score', 'double_extortion_flag', 'ir_activated', 'data_exfiltrated_gb', 'detection_outcome', 'target_segment_id', 'endpoints_compromised'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb006-sample/auth_events.csv (at revision 74265056f8a3b53ce18934892c675bae83eb323f), [/tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
event_id: string
session_id: string
user_id: string
event_type: string
event_timestamp_utc: int64
target_account_id: string
source_domain_id: string
target_domain_id: string
application_id: string
risk_score_delta: double
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1527
to
{'campaign_id': Value('string'), 'actor_id': Value('string'), 'timestep': Value('int64'), 'attack_phase': Value('string'), 'files_encrypted_cumulative': Value('int64'), 'encryption_throughput_mbps': Value('float64'), 'endpoints_compromised': Value('int64'), 'lateral_move_count': Value('int64'), 'credential_harvest_count': Value('int64'), 'c2_bytes_exfiltrated': Value('float64'), 'defender_alert_score': Value('float64'), 'detection_outcome': Value('string'), 'blast_radius_pct': Value('float64'), 'actor_capability_tier': Value('string'), 'living_off_land_score': Value('float64'), 'attribution_risk_score': Value('float64'), 'data_exfiltrated_gb': Value('float64'), 'wiper_flag': Value('int64'), 'double_extortion_flag': Value('int64'), 'ir_activated': Value('int64'), 'target_segment_id': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 10 new columns ({'application_id', 'risk_score_delta', 'session_id', 'user_id', 'event_id', 'source_domain_id', 'event_timestamp_utc', 'event_type', 'target_account_id', 'target_domain_id'}) and 21 missing columns ({'lateral_move_count', 'credential_harvest_count', 'attack_phase', 'actor_capability_tier', 'files_encrypted_cumulative', 'living_off_land_score', 'encryption_throughput_mbps', 'timestep', 'c2_bytes_exfiltrated', 'blast_radius_pct', 'wiper_flag', 'actor_id', 'attribution_risk_score', 'campaign_id', 'defender_alert_score', 'double_extortion_flag', 'ir_activated', 'data_exfiltrated_gb', 'detection_outcome', 'target_segment_id', 'endpoints_compromised'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb006-sample/auth_events.csv (at revision 74265056f8a3b53ce18934892c675bae83eb323f), [/tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/attack_timelines.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/auth_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_events.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/campaign_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/identity_topology.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/login_sessions.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/user_risk_summary.csv), /tmp/hf-datasets-cache/medium/datasets/37054421844346-config-parquet-and-info-xpertsystems-cyb006-sampl-8bf69779/hub/datasets--xpertsystems--cyb006-sample/snapshots/74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv (origin=hf://datasets/xpertsystems/cyb006-sample@74265056f8a3b53ce18934892c675bae83eb323f/victim_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
campaign_id string | actor_id string | timestep int64 | attack_phase string | files_encrypted_cumulative int64 | encryption_throughput_mbps float64 | endpoints_compromised int64 | lateral_move_count int64 | credential_harvest_count int64 | c2_bytes_exfiltrated float64 | defender_alert_score float64 | detection_outcome string | blast_radius_pct float64 | actor_capability_tier string | living_off_land_score float64 | attribution_risk_score float64 | data_exfiltrated_gb float64 | wiper_flag int64 | double_extortion_flag int64 | ir_activated int64 | target_segment_id string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CAMP000001 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 80.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 860.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,129.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 3 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,588.6 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 4 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,829.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 5 | initial_access | 0 | 0 | 0 | 0 | 0 | 1,967.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 6 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,060 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 7 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,185.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 8 | initial_access | 0 | 0 | 0 | 0 | 0 | 2,215.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 9 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,322.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 10 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,409.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 11 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,777.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 12 | initial_access | 0 | 0 | 0 | 0 | 0 | 3,982.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 13 | initial_access | 0 | 0 | 0 | 0 | 0 | 4,743 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 14 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,384.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 15 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,386.3 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 16 | initial_access | 0 | 0 | 0 | 0 | 0 | 5,537.7 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 17 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,195.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 18 | initial_access | 0 | 0 | 0 | 0 | 0 | 6,538.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 2 | 8,340.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 2 | 9,643.9 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,080 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 3 | 12,432.6 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 4 | 12,614 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,959.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 25 | internal_recon | 0 | 0 | 0 | 0 | 5 | 14,156.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 26 | internal_recon | 0 | 0 | 0 | 0 | 5 | 15,593.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 27 | internal_recon | 0 | 0 | 0 | 0 | 6 | 18,234 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 28 | internal_recon | 0 | 0 | 0 | 0 | 8 | 19,223.8 | 0 | no_detection | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 29 | lateral_movement | 0 | 0 | 26 | 26 | 8 | 19,527.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 30 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 19,920.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 31 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,125.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 32 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 20,454.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 33 | privilege_escalation | 0 | 0 | 26 | 26 | 8 | 21,585 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 0 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 34 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 1,290,617 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.269 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 35 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 3,071,483.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 1.781 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 36 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 5,235,916.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.164 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 37 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 7,624,645.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 2.389 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 38 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 11,849,588.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.225 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 39 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 16,271,996.5 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.422 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 40 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 20,946,279.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 4.674 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 41 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 26,330,570.2 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.384 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 42 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 31,816,805.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 5.486 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 43 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 38,550,569.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 6.734 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 44 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 46,025,779.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 7.475 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 45 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 54,424,915.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 8.399 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 46 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 63,527,322.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.102 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 47 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 73,025,307.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.498 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 48 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 82,715,529.1 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 9.69 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 49 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 92,808,046.6 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.093 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 50 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 103,106,807.8 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.299 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 51 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 114,069,495.7 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 10.963 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 52 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 125,890,241.4 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 11.821 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 53 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 139,177,576 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.287 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 54 | exfiltration_staging | 0 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 55 | encryption_detonation | 7,578 | 47.168 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 56 | encryption_detonation | 17,061 | 39.663 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 57 | encryption_detonation | 27,646 | 38.245 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 58 | encryption_detonation | 38,343 | 54.313 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 59 | encryption_detonation | 51,724 | 71.346 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 60 | encryption_detonation | 67,233 | 38.242 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 61 | encryption_detonation | 74,277 | 23.686 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 62 | encryption_detonation | 82,497 | 71.044 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 63 | encryption_detonation | 92,220 | 66.385 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 64 | encryption_detonation | 103,087 | 45.441 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 65 | encryption_detonation | 107,574 | 41.642 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 66 | encryption_detonation | 116,518 | 45.118 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 67 | encryption_detonation | 122,575 | 62.676 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 68 | encryption_detonation | 132,445 | 31.488 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 69 | encryption_detonation | 139,708 | 46.891 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 70 | encryption_detonation | 148,655 | 71.752 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 71 | encryption_detonation | 155,159 | 67.565 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 72 | encryption_detonation | 162,027 | 51.052 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 73 | encryption_detonation | 167,757 | 58.26 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | alert_generated | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 0 | SEG00271 |
CAMP000001 | ACT0001 | 74 | ransom_negotiation | 167,757 | 0 | 26 | 26 | 8 | 153,070,778.3 | 0.62 | delayed_detection | 0.0357 | lone_actor | 0.15 | 0 | 13.893 | 0 | 0 | 1 | SEG00271 |
CAMP000002 | ACT0001 | 0 | initial_access | 0 | 0 | 0 | 0 | 0 | 127.1 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 1 | initial_access | 0 | 0 | 0 | 0 | 0 | 356.4 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 2 | initial_access | 0 | 0 | 0 | 0 | 0 | 992.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 3 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,037.2 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 4 | internal_recon | 0 | 0 | 0 | 0 | 0 | 1,923.8 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 5 | internal_recon | 0 | 0 | 0 | 0 | 1 | 1,973.5 | 0 | no_detection | 0 | lone_actor | 0 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 6 | internal_recon | 0 | 0 | 0 | 0 | 2 | 3,242.2 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 7 | internal_recon | 0 | 0 | 0 | 0 | 3 | 5,509.4 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 8 | internal_recon | 0 | 0 | 0 | 0 | 3 | 7,645 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 9 | internal_recon | 0 | 0 | 0 | 0 | 3 | 8,945.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 10 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,307.1 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 11 | internal_recon | 0 | 0 | 0 | 0 | 4 | 10,495 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 12 | internal_recon | 0 | 0 | 0 | 0 | 5 | 12,096.8 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 13 | internal_recon | 0 | 0 | 0 | 0 | 6 | 12,225.3 | 0 | no_detection | 0 | lone_actor | 0.05 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 14 | internal_recon | 0 | 0 | 0 | 0 | 9 | 12,744.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 15 | internal_recon | 0 | 0 | 0 | 0 | 9 | 13,776.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 16 | internal_recon | 0 | 0 | 0 | 0 | 9 | 14,379.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 17 | internal_recon | 0 | 0 | 0 | 0 | 10 | 16,023.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 18 | internal_recon | 0 | 0 | 0 | 0 | 12 | 17,247.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 19 | internal_recon | 0 | 0 | 0 | 0 | 13 | 19,435.6 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 20 | internal_recon | 0 | 0 | 0 | 0 | 14 | 20,814.4 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 21 | internal_recon | 0 | 0 | 0 | 0 | 16 | 21,450.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 22 | internal_recon | 0 | 0 | 0 | 0 | 18 | 22,031.7 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 23 | internal_recon | 0 | 0 | 0 | 0 | 19 | 23,034.1 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CAMP000002 | ACT0001 | 24 | internal_recon | 0 | 0 | 0 | 0 | 21 | 23,061 | 0 | no_detection | 0 | lone_actor | 0.1 | 0 | 0 | 0 | 0 | 0 | SEG00291 |
CYB006 — Synthetic Login Activity Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB006-SAMPLE · Version 1.0.0
This is a free preview of the full CYB006 — Synthetic Login Activity Dataset product. It contains roughly ~1.3% of the full dataset at identical schema, threat-actor-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
identity_topology.csv |
~150 | ~3,200 | Identity domain registry |
user_risk_summary.csv |
~200 | ~6,500 | Per-user risk aggregates |
login_sessions.csv |
~5,000 | ~377,000 | Per-session login records (primary file) |
auth_events.csv |
~31,900 | ~750,000 | Discrete authentication event log |
Dataset Summary
CYB006 simulates enterprise login activity as a 6-phase session state machine across diverse identity infrastructures, with:
- 4 threat-actor capability tiers: script_kiddie, opportunistic, advanced_persistent_threat (APT), nation_state — with per-tier credential attack patterns, MFA bypass propensity, lateral hop distributions, and Golden Ticket / Pass-the-Hash abuse rates
- 8 identity domain types: on-premises AD, Azure AD, Okta, hybrid_joined, SAML federated, zero_trust_ztna, PAW (privileged access workstation), SaaS application portal — each with distinct detection_strength and resilience scores
- MFA challenge methods: disabled, SMS, TOTP, push notification, phishing-resistant FIDO2 — with per-method bypass propensity calibration
- 6 session lifecycle phases: pre_auth_probe, credential_submission, mfa_challenge, session_active, lateral_traversal, session_termination
- Geo-velocity modeling with impossible travel detection via Haversine distance and per-user expected geolocation baselines
- UEBA scoring with calibrated false-positive rates
- Conditional Access (CA) policy enforcement modeling — ZTNA block strength tunable per architecture
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from authoritative identity security sources (Microsoft Digital Defense Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories, Mandiant M-Trends, MITRE ATT&CK Evaluations, Gartner IAM Hype Cycle, KuppingerCole Leadership Compass).
Benchmark categories (calibrated in both sample and full product):
- Credential attack velocity — brute force (~50 RPS), password spray (<1 RPS)
- Account takeover rate by tier — graduated by attacker capability
- MFA bypass rate — FIDO2 ≤1%, push/SMS variable
- Impossible travel rate — 7-12% of sessions
- Lateral movement depth — capped per tier (script_kiddie ≤1.2 → nation_state ≤14)
- Privilege escalation rate — conditional on lateral movement
- MFA fatigue burst timing — Poisson λ=7 burst pattern
- UEBA false positive rate — calibrated to 10-14% range
- Golden Ticket / Pass-the-Hash detection gap — stealth modeling
- Session duration anomaly separation — KL divergence proxy
- Conditional Access block rate — ZTNA ≥88% for untrusted
- Kill-chain completion rate — phase-to-phase progression
Sample benchmark results:
| Test | Description | Verdict |
|---|---|---|
| T01 | Credential Attack Velocity | ✓ PASS |
| T02 | Account Takeover Rate by Tier | ✓ PASS |
| T03 | MFA Bypass Rate (FIDO2) | ✓ PASS |
| T04 | Impossible Travel Rate | ✓ PASS |
| T05 | Lateral Movement Depth by Tier | ✓ PASS |
| T06 | Privilege Escalation Rate | ✓ PASS |
| T07 | MFA Fatigue Burst Detection | ✓ PASS |
| T08 | UEBA False Positive Rate | ✓ PASS |
| T09 | Golden Ticket / PtH Detection Gap | ✓ PASS |
| T10 | Session Duration Anomaly Separation | ✓ PASS |
| T11 | Conditional Access Block Rate (ZTNA) | ✓ PASS |
| T12 | Kill-Chain Completion Rate | ✓ PASS |
Note: some benchmarks (e.g. nation-state account takeover rates, Golden Ticket detection) require larger sample sizes to converge tightly because they're conditional on small attacker-tier subsets (nation_state ≈ 2% of all sessions, APT ≈ 3%). The full product demonstrates all 12 benchmarks with strong statistical power.
Schema Highlights
login_sessions.csv (primary file)
| Column | Type | Description |
|---|---|---|
| session_id | string | Unique session identifier |
| user_id | string | User identifier (FK to user_risk_summary) |
| session_timestamp_utc | string | ISO timestamp |
| session_phase | string | 1 of 6 phases |
| login_outcome | string | success / failed / mfa_required / blocked |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| geo_country_code | string | ISO 3166 country code |
| geo_city_hash | string | Hashed city locator |
| device_id_hash | string | Hashed device fingerprint |
| device_trust_level | string | unknown / known / managed / compliant |
| authentication_method | string | password / sso / certificate / api_key |
| mfa_challenge_type | string | disabled / sms / totp / push / fido2 |
| mfa_response_latency_ms | int | MFA response latency |
| credential_attempt_count | int | Attempts before success |
| session_duration_seconds | int | Session length |
| target_application_id | string | Application accessed |
| privilege_level_accessed | string | standard / power_user / admin / domain_admin |
| user_risk_tier | string | low / medium / high / critical |
| threat_actor_capability_tier | string | script_kiddie / opportunistic / apt / nation_state (target) |
| geo_anomaly_score | float | Geographic anomaly score (0–1) |
| velocity_anomaly_score | float | Login velocity anomaly score (0–1) |
| impossible_travel_flag | int | Boolean — impossible travel detected |
user_risk_summary.csv (per-user aggregates)
| Column | Type | Description |
|---|---|---|
| user_id | string | User identifier |
| user_risk_tier | string | Risk tier classification target |
| total_login_attempts | int | Total login attempts in window |
| successful_logins | int | Successful logins |
| failed_logins | int | Failed logins |
| mfa_failures | int | MFA challenge failures |
| impossible_travel_events | int | Count of impossible travel detections |
| lateral_hop_count | int | Total lateral movement hops |
| privilege_escalations | int | Privilege escalation count |
| account_lockout_count | int | Account lockout events |
| geo_dispersion_score | float | Geographic dispersion (0–1) |
| login_velocity_score | float | Velocity anomaly (0–1) |
| session_anomaly_rate | float | Fraction of anomalous sessions |
| ueba_alert_count | int | UEBA alerts raised |
| threat_actor_flag | int | Boolean — threat actor |
| account_takeover_flag | int | Boolean — account takeover detected |
| overall_identity_risk_score | float | Composite identity risk (0–1) |
| insider_threat_indicator_score | float | Insider threat composite (0–1) |
See auth_events.csv and identity_topology.csv for the event log and
identity domain schemas respectively.
Suggested Use Cases
- Training account takeover (ATO) detection models
- Threat-actor tier classification — 4-class with realistic class imbalance
- Impossible travel detection — geo-velocity feature engineering
- MFA bypass detection — distinguish FIDO2 anomalies from push fatigue
- Lateral movement detection — session-graph traversal patterns
- Golden Ticket / Pass-the-Hash detection benchmarking
- UEBA precision/recall tuning with calibrated false-positive baselines
- Conditional Access policy effectiveness simulation
- Insider threat scoring with composite behavioral indicators
- Zero Trust posture validation — ZTNA block rate analysis
Loading the Data
import pandas as pd
sessions = pd.read_csv("login_sessions.csv")
users = pd.read_csv("user_risk_summary.csv")
events = pd.read_csv("auth_events.csv")
domains = pd.read_csv("identity_topology.csv")
# Join session data with user-level risk labels
enriched = sessions.merge(users, on="user_id", how="left",
suffixes=("", "_user"))
# Threat-actor tier classification target (4-class)
y_tier = sessions["threat_actor_capability_tier"]
# Binary account-takeover detection target
y_ato = users["account_takeover_flag"]
# Binary impossible-travel target
y_it = sessions["impossible_travel_flag"]
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB006 dataset includes ~1.1 million rows across all four files, with 12 calibrated benchmark validation tests drawn from authoritative identity security and threat intelligence sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb006_sample_2026,
title = {CYB006: Synthetic Login Activity Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb006-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:13:20 UTC
- Session model : 6-phase login lifecycle state machine
- Benchmark tests : 12/12 passing
- Downloads last month
- 10