cyb006-sample / README.md
pradeep-xpert's picture
Upload folder using huggingface_hub
7426505 verified
---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- identity-security
- account-takeover
- mfa-bypass
- ueba
- zero-trust
- apt
- synthetic-data
- lateral-movement
- golden-ticket
pretty_name: CYB006 Synthetic Login Activity Dataset (Sample)
size_categories:
- 1K<n<10K
---
# CYB006 — Synthetic Login Activity Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB006-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB006 — Synthetic Login Activity
Dataset** product. It contains roughly **~1.3% of the full dataset** at
identical schema, threat-actor-tier distribution, and statistical fingerprint,
so you can evaluate fit before licensing the full product.
| File | Rows (sample) | Rows (full) | Description |
|----------------------------|---------------|---------------|----------------------------------------------|
| `identity_topology.csv` | ~150 | ~3,200 | Identity domain registry |
| `user_risk_summary.csv` | ~200 | ~6,500 | Per-user risk aggregates |
| `login_sessions.csv` | ~5,000 | ~377,000 | Per-session login records (primary file) |
| `auth_events.csv` | ~31,900 | ~750,000 | Discrete authentication event log |
## Dataset Summary
CYB006 simulates enterprise login activity as a **6-phase session state
machine** across diverse identity infrastructures, with:
- **4 threat-actor capability tiers**: script_kiddie, opportunistic,
advanced_persistent_threat (APT), nation_state — with per-tier credential
attack patterns, MFA bypass propensity, lateral hop distributions, and
Golden Ticket / Pass-the-Hash abuse rates
- **8 identity domain types**: on-premises AD, Azure AD, Okta, hybrid_joined,
SAML federated, zero_trust_ztna, PAW (privileged access workstation),
SaaS application portal — each with distinct detection_strength and
resilience scores
- **MFA challenge methods**: disabled, SMS, TOTP, push notification,
phishing-resistant FIDO2 — with per-method bypass propensity calibration
- **6 session lifecycle phases**: pre_auth_probe, credential_submission,
mfa_challenge, session_active, lateral_traversal, session_termination
- **Geo-velocity modeling** with impossible travel detection via Haversine
distance and per-user expected geolocation baselines
- **UEBA scoring** with calibrated false-positive rates
- **Conditional Access (CA) policy enforcement** modeling — ZTNA block
strength tunable per architecture
## Calibrated Benchmark Targets
The full product is calibrated to **12 benchmark validation tests** drawn
from authoritative identity security sources (Microsoft Digital Defense
Report, Okta Customer Identity Trends, Verizon DBIR, CISA Joint Advisories,
Mandiant M-Trends, MITRE ATT&CK Evaluations, Gartner IAM Hype Cycle,
KuppingerCole Leadership Compass).
**Benchmark categories** (calibrated in both sample and full product):
1. **Credential attack velocity** — brute force (~50 RPS), password spray (<1 RPS)
2. **Account takeover rate by tier** — graduated by attacker capability
3. **MFA bypass rate** — FIDO2 ≤1%, push/SMS variable
4. **Impossible travel rate** — 7-12% of sessions
5. **Lateral movement depth** — capped per tier (script_kiddie ≤1.2 → nation_state ≤14)
6. **Privilege escalation rate** — conditional on lateral movement
7. **MFA fatigue burst timing** — Poisson λ=7 burst pattern
8. **UEBA false positive rate** — calibrated to 10-14% range
9. **Golden Ticket / Pass-the-Hash detection gap** — stealth modeling
10. **Session duration anomaly separation** — KL divergence proxy
11. **Conditional Access block rate** — ZTNA ≥88% for untrusted
12. **Kill-chain completion rate** — phase-to-phase progression
Sample benchmark results:
| Test | Description | Verdict |
|------|-------------|---------|
| T01 | Credential Attack Velocity | ✓ PASS |
| T02 | Account Takeover Rate by Tier | ✓ PASS |
| T03 | MFA Bypass Rate (FIDO2) | ✓ PASS |
| T04 | Impossible Travel Rate | ✓ PASS |
| T05 | Lateral Movement Depth by Tier | ✓ PASS |
| T06 | Privilege Escalation Rate | ✓ PASS |
| T07 | MFA Fatigue Burst Detection | ✓ PASS |
| T08 | UEBA False Positive Rate | ✓ PASS |
| T09 | Golden Ticket / PtH Detection Gap | ✓ PASS |
| T10 | Session Duration Anomaly Separation | ✓ PASS |
| T11 | Conditional Access Block Rate (ZTNA) | ✓ PASS |
| T12 | Kill-Chain Completion Rate | ✓ PASS |
*Note: some benchmarks (e.g. nation-state account takeover rates, Golden
Ticket detection) require larger sample sizes to converge tightly because
they're conditional on small attacker-tier subsets (nation_state ≈ 2% of
all sessions, APT ≈ 3%). The full product demonstrates all 12 benchmarks
with strong statistical power.*
## Schema Highlights
### `login_sessions.csv` (primary file)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| session_id | string | Unique session identifier |
| user_id | string | User identifier (FK to user_risk_summary) |
| session_timestamp_utc | string | ISO timestamp |
| session_phase | string | 1 of 6 phases |
| login_outcome | string | success / failed / mfa_required / blocked |
| source_ip_hash | string | SHA-256 pseudonymised source IP |
| geo_country_code | string | ISO 3166 country code |
| geo_city_hash | string | Hashed city locator |
| device_id_hash | string | Hashed device fingerprint |
| device_trust_level | string | unknown / known / managed / compliant |
| authentication_method | string | password / sso / certificate / api_key |
| mfa_challenge_type | string | disabled / sms / totp / push / fido2 |
| mfa_response_latency_ms | int | MFA response latency |
| credential_attempt_count | int | Attempts before success |
| session_duration_seconds | int | Session length |
| target_application_id | string | Application accessed |
| privilege_level_accessed | string | standard / power_user / admin / domain_admin |
| user_risk_tier | string | low / medium / high / critical |
| threat_actor_capability_tier | string | script_kiddie / opportunistic / apt / nation_state (target) |
| geo_anomaly_score | float | Geographic anomaly score (0–1) |
| velocity_anomaly_score | float | Login velocity anomaly score (0–1) |
| impossible_travel_flag | int | Boolean — impossible travel detected |
### `user_risk_summary.csv` (per-user aggregates)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| user_id | string | User identifier |
| user_risk_tier | string | Risk tier classification target |
| total_login_attempts | int | Total login attempts in window |
| successful_logins | int | Successful logins |
| failed_logins | int | Failed logins |
| mfa_failures | int | MFA challenge failures |
| impossible_travel_events | int | Count of impossible travel detections |
| lateral_hop_count | int | Total lateral movement hops |
| privilege_escalations | int | Privilege escalation count |
| account_lockout_count | int | Account lockout events |
| geo_dispersion_score | float | Geographic dispersion (0–1) |
| login_velocity_score | float | Velocity anomaly (0–1) |
| session_anomaly_rate | float | Fraction of anomalous sessions |
| ueba_alert_count | int | UEBA alerts raised |
| threat_actor_flag | int | Boolean — threat actor |
| account_takeover_flag | int | Boolean — account takeover detected |
| overall_identity_risk_score | float | Composite identity risk (0–1) |
| insider_threat_indicator_score | float | Insider threat composite (0–1) |
See `auth_events.csv` and `identity_topology.csv` for the event log and
identity domain schemas respectively.
## Suggested Use Cases
- Training **account takeover (ATO) detection** models
- **Threat-actor tier classification** — 4-class with realistic class imbalance
- **Impossible travel detection** — geo-velocity feature engineering
- **MFA bypass detection** — distinguish FIDO2 anomalies from push fatigue
- **Lateral movement detection** — session-graph traversal patterns
- **Golden Ticket / Pass-the-Hash** detection benchmarking
- **UEBA precision/recall tuning** with calibrated false-positive baselines
- **Conditional Access policy effectiveness** simulation
- **Insider threat scoring** with composite behavioral indicators
- **Zero Trust posture validation** — ZTNA block rate analysis
## Loading the Data
```python
import pandas as pd
sessions = pd.read_csv("login_sessions.csv")
users = pd.read_csv("user_risk_summary.csv")
events = pd.read_csv("auth_events.csv")
domains = pd.read_csv("identity_topology.csv")
# Join session data with user-level risk labels
enriched = sessions.merge(users, on="user_id", how="left",
suffixes=("", "_user"))
# Threat-actor tier classification target (4-class)
y_tier = sessions["threat_actor_capability_tier"]
# Binary account-takeover detection target
y_ato = users["account_takeover_flag"]
# Binary impossible-travel target
y_it = sessions["impossible_travel_flag"]
```
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB006 dataset includes **~1.1 million rows** across all four files,
with 12 calibrated benchmark validation tests drawn from authoritative
identity security and threat intelligence sources.
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb006_sample_2026,
title = {CYB006: Synthetic Login Activity Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb006-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:13:20 UTC
- Session model : 6-phase login lifecycle state machine
- Benchmark tests : 12/12 passing