Dataset Viewer
Duplicate
The dataset viewer is not available for this split.
Cannot extract the features (columns) for the split 'train' of the config 'default' of the dataset.
Error code:   FeaturesError
Exception:    ArrowInvalid
Message:      Schema at index 1 was different: 
incident_id: string
case_type: string
theme: string
difficulty_tier: string
timeline_profile: string
start_time: timestamp[s]
end_time: timestamp[s]
platform_coverage: list<item: string>
minimum_log_sources_required: list<item: string>
full_log_sources_used: list<item: string>
noise_model_applied: struct<profile: string, background_event_ratio: double>
message_samples_used: list<item: struct<target_device: string, text: string, sender_type: string, delivery_channel: string>>
page_construction_detail_safe: struct<no_brand_copy: bool, stepper_ui_flow: list<item: string>, visual_style_notes: list<item: string>, form_risk_class: string, fields_requested: list<item: string>, detection_cues_for_human_analyst: list<item: null>>
persona: struct<user_id: string, job_title: string, risk_profile: string, devices: list<item: struct<device_id: string, platform: string, os_version: string>>>
behavioral_model_for_this_incident: struct<scenario: string, why_this_behavior: string, time_gap_rationale: string>
expected_rules: struct<must_fire: list<item: null>, should_fire: list<item: null>, optional: list<item: null>, expected_fire_path: struct<>>
event_stream: list<item: struct<_event_index: string, _phase: string, event_id: string, time: timestamp[s], log_source: string, event_type: string, severity: string, entity: struct<user_id: string, device_id: string, platform: string, os_version: string, mdm_enrolled: bool, device_fingerprint_status: string>, network: struct<carrier: string, carrier_network_type: string, roaming: bool, dst_domain: string, dst_ip: string, ttl_sec: int64, domain_age_days: int64, domain_reputation: double, resolver: string, http: struct<method: string, path: string, status_code: int64, content_type: string>>, object: struct<sender_type: string, sender_id: string, contains_url: bool, message_features: struct<urgency_language: bool, sender_verification: bool>, traffic_category: string, qtype: string, user_initiated: bool, behavior: struct<signal: string, user_interaction: string, dwell_time_ms: int64>>, correlation: struct<incident_id: string, session_id: string>, label: struct<ground_truth: string, case_type: string, attack_stage: null, activity_stage: string, theme: string>, original_source_hint: string, noise_metadata: struct<duplicate_of: string, reason: string>>>
event_stream_timeline_summary: struct<total_events: int64, malicious_events: int64, benign_context_events: int64, noise_events_included: int64, phases: list<item: struct<phase: string, time_range: string, events: int64, desc: string>>, total_elapsed_minutes: double, key_time_gaps_explained: struct<SMS_to_Web_Access: string, Web_Dwell_Time: string>>
rule_fire_verification: struct<SMISH_REDIRECT_CHAIN: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PHISH_WARNING_BYPASS: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, SENSITIVE_FORM_SEQUENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PLATFORM_DIVERGENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, POST_LURE_FINANCIAL_RISK_SIGNAL: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>>
scaling_template: struct<to_reach_200_events: struct<background_events_to_add: int64, background_composition: struct<messaging_sync: int64, email_sync: int64, push_notification: int64, software_update: int64, cdn_traffic: int64, utility_widgets: int64, mdm_checkin: int64, cloud_backup: int64>>>
vs
incident_id: string
case_type: string
theme: string
difficulty_tier: string
timeline_profile: string
start_time: timestamp[s]
end_time: timestamp[s]
platform_coverage: list<item: string>
minimum_log_sources_required: list<item: string>
full_log_sources_used: list<item: string>
noise_model_applied: struct<profile: string, background_event_ratio: double>
message_samples_used: list<item: struct<target_device: string, text: string, sender_type: string, delivery_channel: string>>
page_construction_detail_safe: struct<no_brand_copy: bool, stepper_ui_flow: list<item: string>, visual_style_notes: list<item: string>, form_risk_class: string, fields_requested: list<item: string>, detection_cues_for_human_analyst: list<item: null>>
persona: struct<user_id: string, job_title: string, risk_profile: string, devices: list<item: struct<device_id: string, platform: string, os_version: string>>>
behavioral_model_for_this_incident: struct<scenario: string, why_this_behavior: string, time_gap_rationale: string>
expected_rules: struct<must_fire: list<item: null>, should_fire: list<item: null>, optional: list<item: null>, expected_fire_path: struct<>>
event_stream: list<item: struct<_event_index: string, _phase: string, event_id: string, time: timestamp[s], log_source: string, event_type: string, severity: string, entity: struct<user_id: string, device_id: string, platform: string, os_version: string, mdm_enrolled: bool, device_fingerprint_status: string, browser: string>, network: struct<dst_domain: string, dst_ip: string, http: struct<method: string, path: string, status_code: int64, user_initiated: bool>, carrier: string, carrier_network_type: string, roaming: bool, ttl_sec: int64, domain_age_days: int64, domain_reputation: double, resolver: string, sni: string, tls_version: string>, object: struct<traffic_category: string, sender_type: string, sender_id: string, contains_url: bool, message_features: struct<urgency_language: bool, sender_verification: bool>, qtype: string, user_initiated: bool, behavior: struct<signal: string, user_interaction: string, dwell_time_ms: int64, form_fields_observed: list<item: string>>>, correlation: struct<incident_id: string, message_id: string, session_id: string>, label: struct<ground_truth: string, case_type: string, attack_stage: null, theme: string, activity_stage: string>, original_source_hint: string, noise_metadata: struct<duplicate_of: string, reason: string>>>
event_stream_timeline_summary: struct<total_events: int64, malicious_events: int64, benign_context_events: int64, noise_events_included: int64, phases: list<item: struct<phase: string, time_range: string, events: int64, desc: string>>, total_elapsed_minutes: double, key_time_gaps_explained: struct<sms_to_click: string, form_interaction: string>>
rule_fire_verification: struct<SMISH_REDIRECT_CHAIN: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PHISH_WARNING_BYPASS: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, SENSITIVE_FORM_SEQUENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PLATFORM_DIVERGENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, POST_LURE_FINANCIAL_RISK_SIGNAL: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>>
scaling_template: struct<to_reach_200_events: struct<background_events_to_add: int64, background_composition: struct<messaging_sync: int64, email_sync: int64, push_notification: int64, software_update: int64, cdn_traffic: int64, utility_widgets: int64, mdm_checkin: int64, cloud_backup: int64>>>
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/split/first_rows.py", line 243, in compute_first_rows_from_streaming_response
                  iterable_dataset = iterable_dataset._resolve_features()
                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 3608, in _resolve_features
                  features = _infer_features_from_batch(self.with_format(None)._head())
                                                        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2368, in _head
                  return next(iter(self.iter(batch_size=n)))
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2573, in iter
                  for key, example in iterator:
                                      ^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2060, in __iter__
                  for key, pa_table in self._iter_arrow():
                                       ^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 2082, in _iter_arrow
                  yield from self.ex_iterable._iter_arrow()
                File "/usr/local/lib/python3.12/site-packages/datasets/iterable_dataset.py", line 572, in _iter_arrow
                  yield new_key, pa.Table.from_batches(chunks_buffer)
                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "pyarrow/table.pxi", line 5039, in pyarrow.lib.Table.from_batches
                File "pyarrow/error.pxi", line 155, in pyarrow.lib.pyarrow_internal_check_status
                File "pyarrow/error.pxi", line 92, in pyarrow.lib.check_status
              pyarrow.lib.ArrowInvalid: Schema at index 1 was different: 
              incident_id: string
              case_type: string
              theme: string
              difficulty_tier: string
              timeline_profile: string
              start_time: timestamp[s]
              end_time: timestamp[s]
              platform_coverage: list<item: string>
              minimum_log_sources_required: list<item: string>
              full_log_sources_used: list<item: string>
              noise_model_applied: struct<profile: string, background_event_ratio: double>
              message_samples_used: list<item: struct<target_device: string, text: string, sender_type: string, delivery_channel: string>>
              page_construction_detail_safe: struct<no_brand_copy: bool, stepper_ui_flow: list<item: string>, visual_style_notes: list<item: string>, form_risk_class: string, fields_requested: list<item: string>, detection_cues_for_human_analyst: list<item: null>>
              persona: struct<user_id: string, job_title: string, risk_profile: string, devices: list<item: struct<device_id: string, platform: string, os_version: string>>>
              behavioral_model_for_this_incident: struct<scenario: string, why_this_behavior: string, time_gap_rationale: string>
              expected_rules: struct<must_fire: list<item: null>, should_fire: list<item: null>, optional: list<item: null>, expected_fire_path: struct<>>
              event_stream: list<item: struct<_event_index: string, _phase: string, event_id: string, time: timestamp[s], log_source: string, event_type: string, severity: string, entity: struct<user_id: string, device_id: string, platform: string, os_version: string, mdm_enrolled: bool, device_fingerprint_status: string>, network: struct<carrier: string, carrier_network_type: string, roaming: bool, dst_domain: string, dst_ip: string, ttl_sec: int64, domain_age_days: int64, domain_reputation: double, resolver: string, http: struct<method: string, path: string, status_code: int64, content_type: string>>, object: struct<sender_type: string, sender_id: string, contains_url: bool, message_features: struct<urgency_language: bool, sender_verification: bool>, traffic_category: string, qtype: string, user_initiated: bool, behavior: struct<signal: string, user_interaction: string, dwell_time_ms: int64>>, correlation: struct<incident_id: string, session_id: string>, label: struct<ground_truth: string, case_type: string, attack_stage: null, activity_stage: string, theme: string>, original_source_hint: string, noise_metadata: struct<duplicate_of: string, reason: string>>>
              event_stream_timeline_summary: struct<total_events: int64, malicious_events: int64, benign_context_events: int64, noise_events_included: int64, phases: list<item: struct<phase: string, time_range: string, events: int64, desc: string>>, total_elapsed_minutes: double, key_time_gaps_explained: struct<SMS_to_Web_Access: string, Web_Dwell_Time: string>>
              rule_fire_verification: struct<SMISH_REDIRECT_CHAIN: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PHISH_WARNING_BYPASS: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, SENSITIVE_FORM_SEQUENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PLATFORM_DIVERGENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, POST_LURE_FINANCIAL_RISK_SIGNAL: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>>
              scaling_template: struct<to_reach_200_events: struct<background_events_to_add: int64, background_composition: struct<messaging_sync: int64, email_sync: int64, push_notification: int64, software_update: int64, cdn_traffic: int64, utility_widgets: int64, mdm_checkin: int64, cloud_backup: int64>>>
              vs
              incident_id: string
              case_type: string
              theme: string
              difficulty_tier: string
              timeline_profile: string
              start_time: timestamp[s]
              end_time: timestamp[s]
              platform_coverage: list<item: string>
              minimum_log_sources_required: list<item: string>
              full_log_sources_used: list<item: string>
              noise_model_applied: struct<profile: string, background_event_ratio: double>
              message_samples_used: list<item: struct<target_device: string, text: string, sender_type: string, delivery_channel: string>>
              page_construction_detail_safe: struct<no_brand_copy: bool, stepper_ui_flow: list<item: string>, visual_style_notes: list<item: string>, form_risk_class: string, fields_requested: list<item: string>, detection_cues_for_human_analyst: list<item: null>>
              persona: struct<user_id: string, job_title: string, risk_profile: string, devices: list<item: struct<device_id: string, platform: string, os_version: string>>>
              behavioral_model_for_this_incident: struct<scenario: string, why_this_behavior: string, time_gap_rationale: string>
              expected_rules: struct<must_fire: list<item: null>, should_fire: list<item: null>, optional: list<item: null>, expected_fire_path: struct<>>
              event_stream: list<item: struct<_event_index: string, _phase: string, event_id: string, time: timestamp[s], log_source: string, event_type: string, severity: string, entity: struct<user_id: string, device_id: string, platform: string, os_version: string, mdm_enrolled: bool, device_fingerprint_status: string, browser: string>, network: struct<dst_domain: string, dst_ip: string, http: struct<method: string, path: string, status_code: int64, user_initiated: bool>, carrier: string, carrier_network_type: string, roaming: bool, ttl_sec: int64, domain_age_days: int64, domain_reputation: double, resolver: string, sni: string, tls_version: string>, object: struct<traffic_category: string, sender_type: string, sender_id: string, contains_url: bool, message_features: struct<urgency_language: bool, sender_verification: bool>, qtype: string, user_initiated: bool, behavior: struct<signal: string, user_interaction: string, dwell_time_ms: int64, form_fields_observed: list<item: string>>>, correlation: struct<incident_id: string, message_id: string, session_id: string>, label: struct<ground_truth: string, case_type: string, attack_stage: null, theme: string, activity_stage: string>, original_source_hint: string, noise_metadata: struct<duplicate_of: string, reason: string>>>
              event_stream_timeline_summary: struct<total_events: int64, malicious_events: int64, benign_context_events: int64, noise_events_included: int64, phases: list<item: struct<phase: string, time_range: string, events: int64, desc: string>>, total_elapsed_minutes: double, key_time_gaps_explained: struct<sms_to_click: string, form_interaction: string>>
              rule_fire_verification: struct<SMISH_REDIRECT_CHAIN: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PHISH_WARNING_BYPASS: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, SENSITIVE_FORM_SEQUENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, PLATFORM_DIVERGENCE: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>, POST_LURE_FINANCIAL_RISK_SIGNAL: struct<fires: bool, fire_path: string, trigger: string, within_window: bool>>
              scaling_template: struct<to_reach_200_events: struct<background_events_to_add: int64, background_composition: struct<messaging_sync: int64, email_sync: int64, push_notification: int64, software_update: int64, cdn_traffic: int64, utility_widgets: int64, mdm_checkin: int64, cloud_backup: int64>>>

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

KR-MOB-SMISHING v1

한국형 모바일 스미싱 합성 데이터셋 — SIEM 상관분석 훈련용

Korean Mobile Smishing Synthetic Dataset for SIEM Correlation Training


이 데이터셋을 만든 이유

2024년 한국의 스미싱 피해 건수는 22만 건을 넘었습니다. 전년 대비 290% 급증. 피해 금액은 1조 4천억 원에 달합니다.

택배 문자를 눌렀을 뿐인 부모님, 은행 보안 알림을 믿은 직장인, 면접 결과 문자에 속은 취업준비생. 피해자는 늘 평범한 사람들입니다.

그런데 이 공격을 막아야 할 보안팀과 AI 모델은 역설적인 상황에 놓여 있습니다. 실제 스미싱 로그는 개인정보 보호 규정과 기업 보안 정책에 묶여 공유가 불가능하고, 방어자들은 데이터 없이 직감에 의존해 탐지 규칙을 만들어야 합니다.

이 악순환을 끊기 위해 KR-MOB-SMISHING을 만들었습니다.

한국 모바일 네트워크에서 실제로 발생하는 공격 패턴을 그대로 재현하되, 개인정보 위험은 제로, 실제 피해 가능성도 제로인 합성 데이터셋입니다. SIEM 상관분석 규칙 개발, 보안 분석가 훈련, 탐지 엔지니어링 벤치마킹을 위해 설계되었습니다.

이 데이터로 훈련한 단 한 명의 보안 분석가가, 단 한 건의 실제 스미싱을 더 빨리 잡아낸다면 — 이 데이터셋을 만든 보람이 있습니다.


Why This Dataset Exists

In 2024, South Korea recorded over 220,000 smishing cases — a 290% surge from the previous year. Victims lost a combined ₩1.4 trillion, and the damage falls hardest on ordinary people: a parent who clicks a fake parcel link, an office worker who trusts a spoofed bank alert, a job seeker who opens a fraudulent interview notice.

Yet the security teams and AI models tasked with stopping these attacks face a paradox: real smishing logs are locked behind privacy regulations and corporate silos, leaving defenders to build detection rules on intuition rather than data.

We built KR-MOB-SMISHING to break that cycle.

This is a purpose-built synthetic dataset of 100 mobile smishing/phishing incidents designed for SIEM correlation rule development, security analyst training, and detection engineering benchmarking. Every incident mirrors the attack patterns actually seen on Korean mobile networks — but with zero privacy risk, zero real-world harm, and full transparency.

If one SOC analyst catches one real smishing campaign faster because they trained on this data, it was worth building.


Dataset Overview

항목 수치
Dataset Name KR-MOB-SMISHING v1
Total Incidents 100
Avg Events / Incident 10.0
Avg Duration 81.8 min
Validation PASS Rate 100% (100/100)
Format JSON (1 file per incident)
Language Korean (한국어)
License CC BY-NC 4.0

Key Features

  • 3가지 케이스 유형: malicious(킬체인 완성), benign_lookalike(부분 공격, 사용자 중단), benign(정상 활동)
  • 한국 실정 반영 10대 스미싱 테마
  • 5개 SIEM 상관분석 규칙 + 사전 검증된 fire/no-fire 판정
  • 12종 이벤트 타입 + MITRE ATT&CK for Mobile 매핑
  • Android/iOS 듀얼 플랫폼 커버리지
  • 3단계 난이도 (HIGH 48%, MEDIUM 42%, LOW 10%)
  • RFC 2606 안전 도메인(.example), TEST-NET IP, 마스킹 전화번호
  • 모든 SMS에 [TRAINING] 워터마크 포함

Case Type Distribution

Case Type Count Ratio Description
malicious 40 40% 킬체인 완성, 피해 발생
benign_lookalike 31 31% 공격 존재하나 사용자 중단
benign 29 29% 정상 활동, 공격 없음

Difficulty Distribution

Tier Count Ratio Description
DT-HIGH 48 48% 다단계 리디렉션, 경고 우회, 금융 사기
DT-MEDIUM 42 42% 중간 복잡도 공격 체인
DT-LOW 10 10% 단순 패턴, 초급 훈련용

Platform Coverage

Platform Appearances Ratio
Android 57 50.4%
iOS 56 49.6%

Theme Coverage (10 Scenarios)

# Theme Count
1 계정 보안 경고 사칭 16
2 가족/지인 사칭 긴급 송금 12
3 채용/면접 결과 사칭 12
4 인증서 갱신/만료 사칭 12
5 통신사 요금/데이터 사칭 9
6 택배/배송 실패 사칭 9
7 결제/승인 확인 사칭 9
8 모바일 금융앱 업데이트 사칭 7
9 정부지원금/환급금 사칭 7
10 공공기관 과태료/세금 사칭 6

Correlation Rule Benchmark

Rule Fires=True Fires=False Fire Rate Window
SMISH_REDIRECT_CHAIN 43 57 43% 180s
SENSITIVE_FORM_SEQUENCE 39 61 39% 600s
POST_LURE_FINANCIAL_RISK_SIGNAL 30 70 30% 900s
PHISH_WARNING_BYPASS 20 80 20% standalone
PLATFORM_DIVERGENCE 7 93 7% 900s

Event Type Distribution

Event Type Count Ratio Category
background.normal_traffic 407 39.3% noise
dns.query 129 12.5% network
sms.received 126 12.2% messaging
http.request 91 8.8% network
http.redirect 59 5.7% network
web.risk_warning 56 5.4% browser_security
ios.web.behavior 54 5.2% browser_security
auth.step_up_challenge 47 4.5% identity
android.web_submission.blocked 24 2.3% endpoint
form.interaction 20 1.9% web_telemetry
bank.transfer_attempt_flagged 17 1.6% financial
device.compliance 5 0.5% endpoint

Safety & Compliance

Check Result
Domain TLD (.example only, RFC 2606) PASS
IP Range (TEST-NET only) PASS
Phone Number (masked only) PASS
Brand Name / Logo None (PASS)
[TRAINING] Watermark All SMS (PASS)
Label Consistency (must_fire = malicious count) PASS

File Structure

KR-MOB-SMISHING-v1/ ├── README.md └── incidents/ ├── inc-MOB-MAL-001.json ├── inc-MOB-BEN-002.json ├── inc-MOB-BEN-003.json └── ... (100 files)

Each JSON file is a self-contained incident with event stream, rule fire verification, scaling template, persona, and behavioral model.


Use Cases

  • SOC 분석가 교육 및 역량 평가
  • SIEM 상관분석 규칙 개발 및 튜닝
  • 탐지 엔지니어링 CI/CD 파이프라인 테스트
  • 퍼플팀(Purple Team) 훈련 시나리오
  • 피싱/스미싱 탐지 학술 연구
  • 보안 제품 벤치마킹

License

This dataset is licensed under Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).

You are free to share and adapt this dataset for non-commercial purposes with appropriate attribution. For commercial use, please contact the author.

https://creativecommons.org/licenses/by-nc/4.0/


Citation

@dataset{kr_mob_smishing_v1_2026, title={KR-MOB-SMISHING v1: Korean Mobile Smishing Synthetic Dataset}, year={2026}, license={CC BY-NC 4.0}, language={Korean} }


Contact

For commercial licensing, questions, or feedback, please open an issue or contact the author. 📧 senimanyc@gmail.com

스미싱 피해는 계속 늘고 있습니다. 훈련 데이터는 턱없이 부족합니다. 이 데이터셋이 그 간극을 조금이라도 줄이는 데 기여하길 바랍니다.

Downloads last month
7