cyb009-sample / README.md
pradeep-xpert's picture
Update README.md
c5653a9 verified
---
license: cc-by-nc-4.0
task_categories:
- tabular-classification
- time-series-forecasting
tags:
- cybersecurity
- vulnerability-management
- cve
- cvss
- epss
- cisa-kev
- synthetic-data
- patch-management
- supply-chain-security
- zero-day
pretty_name: CYB009 Synthetic Vulnerability Intelligence (Sample)
size_categories:
- 100K<n<1M
---
# CYB009 — Synthetic Vulnerability Intelligence Dataset (Sample)
**XpertSystems.ai Synthetic Data Platform · SKU: CYB009-SAMPLE · Version 1.0.0**
This is a **free preview** of the full **CYB009 — Synthetic Vulnerability
Intelligence Dataset** product. It contains roughly **~65% of the full
dataset rows** (but generated from ~40% the org/asset count) at identical
schema, CVSS distribution, and statistical fingerprint, so you can
evaluate fit before licensing the full product.
> 🤖 **Trained baseline + comprehensive leakage audit available:**
> [**xpertsystems/cyb009-baseline-classifier**](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)
> — XGBoost + PyTorch MLP for **8-class vulnerability classification**
> (acc 0.244 ± 0.023, ROC-AUC 0.687 ± 0.014). **The primary artifact
> is `leakage_diagnostic.json`** — the XpertSystems catalog's most
> comprehensive structural-leakage audit, documenting 8 oracle paths
> and 6 README-suggested headline targets that are unlearnable on the
> sample after honest leak removal. Buyers planning CYB009 ML work
> should read the diagnostic first.
> ⚠️ **Important: most README-suggested ML targets are not viable on
> this sample.** The baseline's leakage diagnostic documents that
> `exploit_maturity_final`, `exploitation_occurred_flag`,
> `zero_day_flag`, `cisa_kev_flag`,
> `supply_chain_propagation_flag`, `false_positive_flag`, and the
> per-timestep `lifecycle_phase` / `patch_status` / `remediation_status`
> targets all have structural label-feature determinism that makes
> them either trivially solvable via oracle features or unlearnable
> after honest leak removal. The dataset is still useful for
> evaluation, but ML training requires careful target selection.
*Note: This sample is larger than other CYB SKU samples (~45 MB total).
CYB009 has subset-conditional benchmarks (CISA KEV listing rate, supply
chain propagation) that need a reasonable vulnerability population to
demonstrate convergence reliably. At smaller sizes, those benchmarks fail
to converge, which would understate the full product's calibration quality.*
| File | Rows (sample) | Rows (full) | Description |
|-------------------------------|---------------|---------------|----------------------------------------------|
| `asset_inventory.csv` | ~1280 | ~3,200 | Enterprise asset fleet registry |
| `vuln_summary.csv` | ~2638 | ~6,500 | Per-vulnerability aggregate outcomes |
| `vuln_lifecycle_events.csv` | ~28,779 | ~55,000 | Discrete lifecycle event log |
| `vulnerability_records.csv` | ~316,560 | ~487,500 | Per-timestep trajectory (primary file) |
## Dataset Summary
CYB009 simulates end-to-end vulnerability lifecycles as an **8-phase state
machine** across enterprise asset fleets with calibrated CVSS, EPSS, and
CISA KEV modeling, covering:
- **8-phase vulnerability lifecycle**: discovery → cvss_scoring →
vendor_disclosure → patch_development → patch_release →
exploitation_in_wild → organisational_triage → remediation_deployment
- **Vulnerability classes** (NIST NVD-calibrated CVSS distributions):
memory_corruption, injection_family, authentication_bypass, deserialization,
cryptographic_weakness, race_condition, supply_chain, web_application,
configuration, information_disclosure
- **Asset criticality tiers**: tier_1_critical, tier_2_business,
tier_3_supporting, tier_4_endpoint — with differentiated SLA targets and
remediation behaviors
- **CVSS Base, Temporal, and Environmental scoring** (CVSS v3.1)
- **EPSS v3 modeling** — exploit prediction scores with decay factors
- **CISA KEV catalog modeling** — listing probability conditional on
confirmed exploitation
- **Zero-day exploitation modeling** — Mandiant M-Trends 2023 calibrated
- **Supply chain compromise propagation** — ENISA / Sonatype calibrated
- **Responsible disclosure modeling** — 72% disclosure rate baseline
- **Compensating controls and risk acceptance** outcomes
- **Internet-exposed asset modeling** — 38% exposure baseline
## Trained Baseline + Leakage Audit Available
A working baseline classifier + comprehensive leakage diagnostic is
published at
**[xpertsystems/cyb009-baseline-classifier](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)**.
| Component | Detail |
|---|---|
| **Primary artifact** | **`leakage_diagnostic.json`** — 8 oracle paths + 6 unlearnable targets documented |
| Secondary artifact | 8-class `vulnerability_class` baseline (XGBoost + PyTorch MLP) |
| Models | `model_xgb.json` + `model_mlp.safetensors` |
| Features | 57 (after one-hot encoding); pipeline included as `feature_engineering.py` |
| Split | Stratified random (per-vulnerability) |
| Validation | Single seed + multi-seed aggregate across 10 seeds |
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
| Headline metrics | XGBoost: accuracy 0.244 ± 0.023, macro ROC-AUC 0.687 ± 0.014 (multi-seed) — the catalog's weakest baseline by design |
**Findings for buyers planning CYB009 ML work** (full detail in
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb009-baseline-classifier/blob/main/leakage_diagnostic.json)):
**8 oracle paths discovered on the sample:**
1. `cvss_temporal_score_final / cvss_base_score` ratio is near-deterministic per `exploit_maturity_final` tier (CVSS v3.1 multipliers 0.91/0.94/0.97/1.00)
2. `time_to_exploit_days` (-1 sentinel) is a perfect oracle for `exploitation_occurred_flag`
3. `time_to_remediate_days` (120 sentinel) is a perfect oracle for `remediation_success_flag` and `sla_compliance_flag`
4. `severity_class` is a 100% mechanical function of `cvss_base_score` (CVSS v3.1 boundaries)
5. Five `lifecycle_phase` values pin `remediation_status` deterministically (`residual_risk_review` → 100% `remediated`, etc.)
6. `patch_status = deployed` → 100% `remediated`; four other values → 99% `in_remediation`
7. `risk_score_composite` is computed from flag fields (indirect oracle)
8. `patch_lag_days` is suspected to have similar sentinel structure (precaution)
**6 README-suggested headline targets unlearnable after honest leak removal:**
- `exploit_maturity_final` 4-class (acc 0.31 vs majority 0.36)
- `exploitation_occurred_flag` binary (acc 0.86 vs majority 0.92)
- `zero_day_flag` binary (acc 0.95 vs majority 0.97)
- `cisa_kev_flag` binary (only 14 positives in sample)
- `supply_chain_propagation_flag` binary (only 20 positives)
- `false_positive_flag` binary (acc 0.87 vs majority 0.92)
**Only viable headline target:** `vulnerability_class` 8-class — acc
0.244, ROC-AUC 0.687 vs majority 0.176. The catalog's weakest baseline,
shipped as a reference and as proof that vulnerability_class is the
only README-suggested target that learns honestly on the sample.
## Calibrated Benchmark Targets
The full product is calibrated to 12 benchmark validation tests drawn from
authoritative vulnerability intelligence sources (NIST NVD CVE distributions
2019-2024, EPSS v3 / FIRST / Cyentia empirical data, Rapid7 Vulnerability
Intelligence Report, Qualys TruRisk Report, Tenable Research SLA benchmarks,
Mandiant M-Trends, Verizon DBIR, CISA SBOM / Supply Chain Guidance, CISA
KEV Catalog).
Sample benchmark results:
| Test | Target Range | Observed | Source | Verdict |
|------|--------------|----------|--------|---------|
| T01 CVSS base score mean (all vulns) | [6.800–7.400] | 7.2601 | NIST NVD | ✓ PASS |
| T02 Exploitation rate (critical-tier asse | [0.170–0.220] | 0.1748 | EPSS v3 | ✓ PASS |
| T03 Mean TTE from exploit window (days) | [7.000–14.000] | 11.2200 | Rapid7 | ✓ PASS |
| T04 Patch lag days mean (all classes) | [30.000–55.000] | 35.7600 | Qualys TruRisk | ✓ PASS |
| T05 SLA compliance (critical-severity vul | [0.720–0.800] | 0.7077 | Tenable | ~ MARGINAL |
| T06 Zero-day exploitation rate (fleet) | [0.025–0.040] | 0.0288 | Mandiant | ✓ PASS |
| T07 False positive rate (misconfiguration | [0.100–0.180] | 0.1149 | Verizon DBIR | ✓ PASS |
| T08 Supply chain propagation rate | [0.070–0.120] | 0.0738 | CISA SBOM | ✓ PASS |
| T09 EPSS mean (critical-severity vulns) | [0.140–0.220] | 0.1681 | EPSS v3 | ✓ PASS |
| T10 TTR mean days (high-sev, remediated) | [42.000–62.000] | 41.5800 | Verizon DBIR | ~ MARGINAL |
| T11 CISA KEV listing rate (exploited vuln | [0.040–0.070] | 0.0690 | CISA KEV | ✓ PASS |
| T12 SLA breach rate (critical-severity vu | [0.180–0.280] | 0.2923 | Qualys TruRisk | ~ MARGINAL |
*Note: CYB009 uses range-based benchmarks (target intervals like
`[lo, hi]`) rather than point targets, reflecting how authoritative sources
report vulnerability statistics. Every benchmark in the sample lands within
the same calibrated range as the full product.*
## Schema Highlights
### `vulnerability_records.csv` (primary file, per-timestep)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| vuln_id | string | Synthetic CVE-style identifier |
| asset_id | string | FK to `asset_inventory.csv` |
| timestep | int | Day in lifecycle (0–119) |
| lifecycle_phase | string | 1 of 8 phases |
| vuln_class | string | 10 vulnerability classes |
| cvss_base_score | float | CVSS v3.1 Base Score (0–10) |
| cvss_temporal_score | float | Time-adjusted CVSS |
| cvss_environmental_score | float | Org-specific adjusted CVSS |
| severity | string | none / low / medium / high / critical |
| epss_score | float | EPSS v3 exploitation probability (0–1) |
| exploit_maturity | string | unproven / poc / functional / weaponised |
| patch_status | string | unavailable / official_fix / mitigation / unpatched |
| exploited_in_wild_flag | int | Boolean — active exploitation observed |
| cisa_kev_listed_flag | int | Boolean — listed in CISA KEV catalog |
| zero_day_flag | int | Boolean — zero-day exploitation |
| supply_chain_flag | int | Boolean — supply chain compromise |
| internet_exposed | int | Boolean — asset internet-facing |
| asset_criticality_tier | string | tier_1_critical / tier_2_business / tier_3_supporting / tier_4_endpoint |
| days_since_disclosure | int | Days from public disclosure |
| sla_breached_flag | int | Boolean — SLA breached for this severity |
### `vuln_summary.csv` (per-vulnerability outcome)
| Column | Type | Description |
|---------------------------------|---------|----------------------------------------------|
| vuln_id, asset_id | string | Identifiers |
| vuln_class | string | Classification target |
| cvss_base_score_final | float | Final CVSS Base Score |
| severity_final | string | Final severity bucket |
| epss_score_max | float | Peak EPSS during lifecycle |
| patch_dev_days | int | Days from disclosure to patch release |
| remediation_days | int | Days from patch to org remediation |
| exploited_in_wild | int | Boolean — was exploited |
| cisa_kev_listed | int | Boolean — KEV catalog listing |
| zero_day | int | Boolean — zero-day |
| supply_chain_compromise | int | Boolean — supply chain origin |
| false_positive_flag | int | Boolean — discovery was FP |
| remediation_outcome | string | patched / mitigated / accepted / unpatched |
| sla_breached | int | Boolean — SLA breach |
See `vuln_lifecycle_events.csv` and `asset_inventory.csv` for the discrete
event log and asset registry schemas respectively.
## Suggested Use Cases
- Training **vulnerability classification** models (the baseline ships this) —
[worked example available](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)
- Training **vulnerability triage** models — predict CVSS/EPSS-prioritized
remediation order
- **Zero-day prediction** — feature engineering from pre-disclosure
telemetry (see leakage diagnostic — unlearnable on the sample)
- **CISA KEV listing prediction** — early-warning for emergency patching (see leakage diagnostic — too few positives in the sample)
- **Supply chain compromise detection** — SBOM signal modeling (see leakage diagnostic — too few positives in the sample)
- **Patch deployment ETA forecasting** — per-class patch development
duration prediction
- **SLA breach prediction** — early-warning for at-risk vulnerabilities (see leakage diagnostic — unlearnable on the sample)
- **Asset criticality classification** from inventory features
- **EPSS calibration validation** — empirical vs predicted exploitation (see leakage diagnostic — exploit_maturity_final structurally encoded)
- **Compensating control effectiveness** modeling
- **Risk acceptance decision** modeling — predict which vulns get
accepted vs remediated
- **Lifecycle phase transition prediction** — multi-class sequence modeling (see leakage diagnostic — state-machine determinism)
## Loading the Data
```python
import pandas as pd
records = pd.read_csv("vulnerability_records.csv")
vulns = pd.read_csv("vuln_summary.csv")
events = pd.read_csv("vuln_lifecycle_events.csv")
assets = pd.read_csv("asset_inventory.csv")
# Join trajectory data with vulnerability-level labels and asset context
enriched = records.merge(vulns, on=["vuln_id", "asset_id"], how="left",
suffixes=("", "_summary"))
enriched = enriched.merge(assets, on="asset_id", how="left")
# 8-class vulnerability classification target (the baseline ships this)
y_class = vulns["vulnerability_class"]
# Binary exploitation-in-wild target (see leakage diagnostic — unlearnable on sample)
y_exploited = vulns["exploitation_occurred_flag"]
# Binary CISA KEV listing target (rare event — only 14 positives in sample)
y_kev = vulns["cisa_kev_flag"]
# Binary SLA breach prediction (see leakage diagnostic — unlearnable)
y_sla = records["sla_compliance_flag"] # Note: data uses compliance flag (True=compliant), not breach flag
```
For a worked end-to-end example with vulnerability_class 8-class
classification, stratified splitting, feature engineering, and the
full 8-oracle-path leakage audit, see the
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb009-baseline-classifier).
## License
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
research and evaluation). The **full production dataset** is licensed
commercially — contact XpertSystems.ai for licensing terms.
## Full Product
The full CYB009 dataset includes **~552,000 rows** across all four files,
with calibrated benchmark validation against 12 metrics drawn from
authoritative vulnerability intelligence sources (NIST NVD, EPSS v3,
CISA KEV, Mandiant, Verizon DBIR, Rapid7, Qualys, Tenable).
📧 **pradeep@xpertsystems.ai**
🌐 **https://xpertsystems.ai**
## Citation
```bibtex
@dataset{xpertsystems_cyb009_sample_2026,
title = {CYB009: Synthetic Vulnerability Intelligence Dataset (Sample)},
author = {XpertSystems.ai},
year = {2026},
url = {https://huggingface.co/datasets/xpertsystems/cyb009-sample}
}
```
## Generation Details
- Generator version : 1.0.0
- Random seed : 42
- Generated : 2026-05-16 14:32:26 UTC
- Lifecycle model : 8-phase vulnerability state machine
- Overall benchmark : 93.0 / 100 (grade A)