The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 26 new columns ({'incident_duration_steps', 'organisational_impact_score', 'dlp_blind_spots_identified', 'actor_threat_type', 'cover_tracks_effectiveness', 'exfiltration_volume_total_mb', 'lateral_access_count', 'exfiltration_roi_score', 'incident_type', 'avg_data_access_velocity', 'max_privilege_escalation_depth', 'target_environment_type', 'exfiltration_successes', 'colluding_actor_count', 'actor_efficiency_score', 'stealth_score', 'attribution_risk_score', 'coordinated_incident_flag', 'exfiltration_attempts_total', 'total_data_accessed_mb', 'sabotage_events_executed', 'hr_case_triggers_caused', 'incident_success_flag', 'cover_tracks_events', 'detection_rate', 'exfiltration_success_rate'}) and 5 missing columns ({'event_type', 'dlp_system_id', 'colluding_actor_id', 'target_department_id', 'timestep'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb007-sample/incident_summary.csv (at revision 8d56c30aa3d75bc32cd3d45c155c8d089398efba), [/tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_events.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_events.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/insider_trajectories.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/insider_trajectories.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/org_topology.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/org_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1800, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 765, in write_table
self._write_table(pa_table, writer_batch_size=writer_batch_size)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 773, in _write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2321, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2249, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
incident_id: string
actor_id: string
actor_threat_type: string
target_environment_type: string
incident_type: string
total_data_accessed_mb: double
exfiltration_attempts_total: int64
exfiltration_successes: int64
exfiltration_success_rate: double
detection_rate: double
exfiltration_volume_total_mb: double
avg_data_access_velocity: double
max_privilege_escalation_depth: int64
incident_duration_steps: int64
lateral_access_count: int64
dlp_blind_spots_identified: int64
cover_tracks_events: int64
hr_case_triggers_caused: int64
incident_success_flag: int64
attribution_risk_score: double
stealth_score: double
actor_efficiency_score: double
sabotage_events_executed: int64
colluding_actor_count: int64
coordinated_incident_flag: int64
cover_tracks_effectiveness: double
organisational_impact_score: double
exfiltration_roi_score: double
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 4232
to
{'incident_id': Value('string'), 'actor_id': Value('string'), 'event_type': Value('string'), 'timestep': Value('int64'), 'target_department_id': Value('string'), 'dlp_system_id': Value('string'), 'colluding_actor_id': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 882, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 943, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1646, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1802, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 26 new columns ({'incident_duration_steps', 'organisational_impact_score', 'dlp_blind_spots_identified', 'actor_threat_type', 'cover_tracks_effectiveness', 'exfiltration_volume_total_mb', 'lateral_access_count', 'exfiltration_roi_score', 'incident_type', 'avg_data_access_velocity', 'max_privilege_escalation_depth', 'target_environment_type', 'exfiltration_successes', 'colluding_actor_count', 'actor_efficiency_score', 'stealth_score', 'attribution_risk_score', 'coordinated_incident_flag', 'exfiltration_attempts_total', 'total_data_accessed_mb', 'sabotage_events_executed', 'hr_case_triggers_caused', 'incident_success_flag', 'cover_tracks_events', 'detection_rate', 'exfiltration_success_rate'}) and 5 missing columns ({'event_type', 'dlp_system_id', 'colluding_actor_id', 'target_department_id', 'timestep'}).
This happened while the csv dataset builder was generating data using
hf://datasets/xpertsystems/cyb007-sample/incident_summary.csv (at revision 8d56c30aa3d75bc32cd3d45c155c8d089398efba), [/tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_events.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_events.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_summary.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/incident_summary.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/insider_trajectories.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/insider_trajectories.csv), /tmp/hf-datasets-cache/medium/datasets/10358990103186-config-parquet-and-info-xpertsystems-cyb007-sampl-e7800f56/hub/datasets--xpertsystems--cyb007-sample/snapshots/8d56c30aa3d75bc32cd3d45c155c8d089398efba/org_topology.csv (origin=hf://datasets/xpertsystems/cyb007-sample@8d56c30aa3d75bc32cd3d45c155c8d089398efba/org_topology.csv)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
incident_id string | actor_id string | event_type string | timestep int64 | target_department_id string | dlp_system_id string | colluding_actor_id null |
|---|---|---|---|---|---|---|
INC_000000 | ACTOR_0000 | reconnaissance_initiated | 0 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | sensitive_data_located | 0 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | sensitive_data_located | 2 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | access_baseline_sampled | 2 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | sensitive_data_located | 3 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | sensitive_data_located | 4 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | sensitive_data_located | 5 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 6 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 6 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 7 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 7 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 8 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | pam_session_recorded | 8 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 8 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 9 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | pam_session_recorded | 9 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 9 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | credential_harvested | 10 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | pam_session_recorded | 10 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 11 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 11 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 12 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | pam_session_recorded | 12 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 12 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 13 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | credential_harvested | 13 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | pam_session_recorded | 13 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 13 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | credential_harvested | 14 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 15 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 17 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 19 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | bulk_download_executed | 19 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 19 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 20 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 20 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 21 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 21 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 24 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 25 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 25 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 26 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 26 | DEPT_0027 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 27 | DEPT_0052 | DLP_004 | null |
INC_000000 | ACTOR_0000 | data_staging_initiated | 29 | DEPT_0052 | DLP_004 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 29 | DEPT_0052 | DLP_004 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 30 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 30 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | cloud_upload_exfil_attempted | 31 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 31 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | cloud_upload_exfil_attempted | 32 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 32 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | cloud_upload_exfil_attempted | 34 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | exfiltration_success_confirmed | 34 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | usb_exfil_attempted | 35 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 35 | DEPT_0235 | DLP_003 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 38 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 38 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | email_exfil_attempted | 39 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | cloud_upload_exfil_attempted | 41 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 41 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | exfiltration_attempt_submitted | 42 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | exfiltration_success_confirmed | 42 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | ueba_risk_score_escalated | 42 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | exfiltration_attempt_submitted | 43 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 43 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | dwell_extended | 44 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | exfiltration_attempt_submitted | 45 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 45 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | ueba_risk_score_escalated | 45 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | usb_exfil_attempted | 46 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 46 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | email_exfil_attempted | 47 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | exfiltration_success_confirmed | 47 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | email_exfil_attempted | 49 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 49 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | cloud_upload_exfil_attempted | 51 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | high_risk_alert_triggered | 51 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | ueba_risk_score_escalated | 51 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | sabotage_event_executed | 53 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | dwell_extended | 57 | DEPT_0182 | DLP_006 | null |
INC_000000 | ACTOR_0000 | privilege_escalation_attempted | 64 | DEPT_0160 | DLP_000 | null |
INC_000000 | ACTOR_0000 | moderate_risk_alert_triggered | 64 | DEPT_0160 | DLP_000 | null |
INC_000001 | ACTOR_0000 | reconnaissance_initiated | 0 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | access_baseline_sampled | 0 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | sensitive_data_located | 3 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | privilege_escalation_attempted | 6 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 6 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 7 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | privilege_escalation_attempted | 8 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | moderate_risk_alert_triggered | 8 | DEPT_0217 | DLP_001 | null |
INC_000001 | ACTOR_0000 | privilege_escalation_attempted | 9 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 9 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | data_staging_initiated | 10 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | data_staging_initiated | 11 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 11 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | data_staging_initiated | 12 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 12 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | data_staging_initiated | 14 | DEPT_0120 | DLP_000 | null |
INC_000001 | ACTOR_0000 | high_risk_alert_triggered | 14 | DEPT_0120 | DLP_000 | null |
CYB007 — Synthetic Insider Threat Dataset (Sample)
XpertSystems.ai Synthetic Data Platform · SKU: CYB007-SAMPLE · Version 1.0.0
This is a free preview of the full CYB007 — Synthetic Insider Threat Dataset product. It contains roughly ~10% of the full dataset at identical schema, actor-tier distribution, and statistical fingerprint, so you can evaluate fit before licensing the full product.
| File | Rows (sample) | Rows (full) | Description |
|---|---|---|---|
org_topology.csv |
~240 | ~2,400 | Department / org structure registry |
incident_summary.csv |
~500 | ~4,800 | Per-incident aggregate outcomes |
incident_events.csv |
~38,687 | ~48,000 | Discrete incident event log |
insider_trajectories.csv |
~32,500 | ~280,000 | Per-timestep trajectory data (primary file) |
Dataset Summary
CYB007 simulates end-to-end insider threat incident lifecycles as a 6-phase state machine across enterprise org topologies with calibrated UEBA defender modeling, covering:
- 4 actor threat-type tiers: negligent_user, malicious_employee, privileged_insider, compromised_account — with per-tier stealth weights, data access scopes, cover-tracks propensity, and collusion probabilities
- 8 UEBA defender statuses (graduated maturity ladder): no_ueba, dlp_only, siem_only, partial_coverage, pam_integrated, hr_integrated, full_coverage, zero_trust_enforced — each with distinct detection_strength and alert_suppression characteristics
- 6 lifecycle phases: reconnaissance, access_escalation, data_staging, exfiltration_attempt, cover_tracks, incident_resolution
- Exfiltration channels: email, USB, cloud upload, print, screen capture
- HR-trigger modeling — disgruntlement signals, performance reviews, resignation indicators, and behavioural anomalies that flag IR
- Collusion modeling — coordinated multi-actor incidents with weighted per-tier collusion probabilities
- Attribution risk scoring — recon intensity × stealth weight
- Sabotage outcomes — destructive insider actions distinct from exfiltration
Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from authoritative insider threat research (CERT Insider Threat Center, Verizon DBIR, IBM Cost of Insider Threats, Ponemon Institute, MITRE ATT&CK, NIST SP 800-53 / SP 800-207, Securonix, Forrester UEBA, Gartner ZTNA, CrowdStrike, Mandiant M-Trends).
Sample benchmark results:
| Test | Target | Observed | Verdict |
|---|---|---|---|
| exfiltration_success_rate_priv | 0.1460 | 0.1524 | ✓ PASS |
| detection_rate_zero_trust | 0.9100 | 0.9100 | ✓ PASS |
| alert_suppression_rate | 0.0770 | 0.0798 | ✓ PASS |
| data_access_volume_mean_mb | 220.0 | 151.5 | ~ MARGINAL |
| cover_tracks_rate | 0.1800 | 0.1720 | ✓ PASS |
| dwell_time_ratio | 0.2200 | 0.2212 | ✓ PASS |
| stealth_score_privileged | 0.6800 | 0.7047 | ✓ PASS |
| hr_trigger_rate | 0.1600 | 0.1220 | ✓ PASS |
| incident_success_rate | 0.3400 | 0.3500 | ✓ PASS |
| lateral_access_rate | 0.1100 | 0.1092 | ✓ PASS |
| collusion_rate | 0.0850 | 0.0420 | ~ MARGINAL |
| attribution_risk_score | 0.3100 | 0.2746 | ✓ PASS |
Note: some benchmarks (e.g. privileged_insider exfil success rate, collusion rate, attribution risk) are conditional on smaller actor-tier subsets. The full product (4,800 incidents) demonstrates all 12 benchmarks at Grade A- or better with strong statistical power.
Schema Highlights
insider_trajectories.csv (primary file, per-timestep)
| Column | Type | Description |
|---|---|---|
| incident_id | string | Unique incident identifier |
| actor_id | string | Insider actor ID |
| timestep | int | Step in 6-phase lifecycle (0–64) |
| phase | string | 1 of 6 phases |
| data_access_volume_mb | float | Per-step data accessed |
| payload_entropy | float | Data payload entropy (0–8) |
| cover_actions_taken | int | Cover-tracks actions at this step |
| dlp_alerts_raised | int | DLP alerts triggered |
| detection_flag | int | Boolean — UEBA detection at this step |
| exfil_cumulative_mb | float | Cumulative exfiltrated data |
| blast_radius | float | Org-wide compromise score |
| sensitive_data_accessed | int | Boolean — sensitive data touched |
| threat_type_tier | string | negligent_user / malicious_employee / privileged_insider / compromised_account |
incident_summary.csv (per-incident outcome)
| Column | Type | Description |
|---|---|---|
| incident_id, actor_id | string | Identifiers |
| threat_type_tier | string | Tier classification target |
| ueba_status | string | Defender maturity tier |
| incident_success_flag | int | Boolean — incident succeeded |
| exfiltration_success_flag | int | Boolean — data exfiltrated |
| total_data_volume_mb | float | Total accessed in incident |
| exfiltrated_volume_mb | float | Total exfiltrated |
| cover_tracks_flag | int | Boolean — log tampering attempted |
| hr_trigger_flag | int | Boolean — HR-detected indicators |
| stealth_score | float | Overall stealth (0–1) |
| dwell_time_ratio | float | Fraction of timesteps in dwell |
| collusion_flag | int | Boolean — multi-actor coordination |
| attribution_risk_score | float | Likelihood of attribution (0–1) |
| lateral_access_flag | int | Boolean — out-of-scope dept access |
| sabotage_flag | int | Boolean — destructive action |
See incident_events.csv and org_topology.csv for the discrete event log
and department registry schemas respectively.
Suggested Use Cases
- Training insider threat classifier models (4-tier actor attribution)
- Data exfiltration detection modelling — DLP signal calibration
- UEBA effectiveness benchmarking — graduated 8-tier defender maturity
- HR-signal correlation — disgruntlement, resignation, performance triggers for early-warning systems
- Cover-tracks / log-tampering detection — stealth feature engineering
- Privileged access misuse detection (privileged_insider tier)
- Collusion detection — multi-actor coordinated incident patterns
- Attribution risk modelling — recon intensity × stealth
- Zero Trust posture validation — block rates by defender maturity tier
- Sabotage vs exfiltration discrimination
Loading the Data
import pandas as pd
trajectories = pd.read_csv("insider_trajectories.csv")
incidents = pd.read_csv("incident_summary.csv")
events = pd.read_csv("incident_events.csv")
topology = pd.read_csv("org_topology.csv")
# Join trajectory data with incident-level labels
enriched = trajectories.merge(incidents, on=["incident_id", "actor_id"],
how="left", suffixes=("", "_summary"))
# 4-class threat-type classification target
y_tier = incidents["threat_type_tier"]
# Binary exfiltration-success target
y_exfil = incidents["exfiltration_success_flag"]
# Binary collusion target
y_collusion = incidents["collusion_flag"]
License
This sample is released under CC-BY-NC-4.0 (free for non-commercial research and evaluation). The full production dataset is licensed commercially — contact XpertSystems.ai for licensing terms.
Full Product
The full CYB007 dataset includes ~335,000 rows across all four files, with calibrated benchmark validation against 12 metrics drawn from authoritative insider threat research sources.
📧 pradeep@xpertsystems.ai 🌐 https://xpertsystems.ai
Citation
@dataset{xpertsystems_cyb007_sample_2026,
title = {CYB007: Synthetic Insider Threat Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb007-sample}
}
Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:17:56 UTC
- Lifecycle model : 6-phase insider threat state machine
- Overall benchmark : 95.3 / 100 (grade A)
- Downloads last month
- 8