solsticestudioai commited on
Commit
7fc0764
·
verified ·
1 Parent(s): f32f52f

Add Dark Pool sample (10K fraud/AML sequences) with README, SCHEMA, parquet, JSONL

Browse files
Files changed (5) hide show
  1. .gitattributes +1 -0
  2. README.md +163 -0
  3. SCHEMA.md +107 -0
  4. dark_pool_sample.jsonl +3 -0
  5. dark_pool_sample.parquet +3 -0
.gitattributes CHANGED
@@ -58,3 +58,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
 
 
58
  # Video files - compressed
59
  *.mp4 filter=lfs diff=lfs merge=lfs -text
60
  *.webm filter=lfs diff=lfs merge=lfs -text
61
+ dark_pool_sample.jsonl filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,163 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: cc-by-4.0
3
+ task_categories:
4
+ - tabular-classification
5
+ - tabular-regression
6
+ - time-series-forecasting
7
+ language:
8
+ - en
9
+ tags:
10
+ - synthetic
11
+ - finance
12
+ - fraud-detection
13
+ - aml
14
+ - anti-money-laundering
15
+ - anomaly-detection
16
+ - transaction-monitoring
17
+ - fintech
18
+ - banking
19
+ - crypto
20
+ - market-manipulation
21
+ - account-takeover
22
+ - false-positive-reduction
23
+ pretty_name: Aestrea Dark Pool Financial Anomaly Pack
24
+ size_categories:
25
+ - 10K<n<100K
26
+ configs:
27
+ - config_name: default
28
+ data_files:
29
+ - split: train
30
+ path: dark_pool_sample.parquet
31
+ ---
32
+
33
+ # Aestrea Dark Pool Financial Anomaly Pack (Sample)
34
+
35
+ **A synthetic financial-anomaly and fraud-detection dataset for AML / transaction-monitoring model training, false-positive reduction research, and fintech anomaly-detection pipelines.** Each row is a complete financial activity sequence — a dormant warm-up period followed by a sudden activity burst — labeled as account takeover, market-manipulation spoofing, or legitimate-but-high-risk (false positive) behavior, with telemetry, identity context, detection logic, and financial exposure.
36
+
37
+ Built by [SolsticeAI](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic. No real transactions, accounts, addresses, order books, or customer data.
38
+
39
+ ## What is included
40
+
41
+ | File | Rows | Format | Purpose |
42
+ |---|---:|---|---|
43
+ | `dark_pool_sample.parquet` | 10,000 | Parquet | Columnar, typed, best for analytics |
44
+ | `dark_pool_sample.jsonl` | 10,000 | JSON Lines | Streaming / LLM training friendly |
45
+
46
+ **This sample:** 10,000 financial activity sequences, stratified 3,333 per fraud class.
47
+ **Fraud classes (3):** `Account_Takeover_Sequence`, `Market_Manipulation_Spoofing`, `Legitimate_High_Risk_Activity` (false positive)
48
+ **Label distribution:** ~6,666 `fraudulent` / ~3,334 `benign` (by design — one of three scenarios is a benign high-risk lookalike)
49
+ **Severity tiers:** `low`, `medium`, `high`, `critical` — scenario-weighted so spoofing skews mid, ATO skews high, false-positives skew low
50
+ **Assets covered:** BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY
51
+ **Geographic coverage:** 20 country codes across high-risk and low-risk jurisdictions
52
+
53
+ ## Record structure
54
+
55
+ Each record is one financial activity sequence with 7 top-level fields:
56
+
57
+ | Field | Type | Contents |
58
+ |---|---|---|
59
+ | `schema_version` | string | Pack schema version (`1.0.0-dark-pool-sample`) |
60
+ | `event` | struct | `id`, `trace_id`, `timestamp`, `severity`, `label`, `label_confidence` |
61
+ | `identity_context` | struct | `account_id`, `baseline_risk_score`, `session_entropy`, `account_age_days`, `kyc_tier` |
62
+ | `telemetry_stream` | list<struct> | Ordered financial events: `timestamp`, `event_name` (e.g., `LARGE_WITHDRAWAL`, `LIMIT_ORDER_CANCELLED`, `LOGIN_NEW_COUNTRY`), `asset`, `transaction_amount_usd`, `geo_country`, `latency_ms`, `burst_indicator` |
63
+ | `vulnerability` | struct | `fraud_class`, `scenario_description`, `exposure_vector` |
64
+ | `detection` | struct | `anomaly_type`, `baseline_deviation`, `detection_logic` (SQL-like), `anomaly_score`, `confidence_band` |
65
+ | `impact` | struct | `financial_exposure_usd`, `customer_funds_at_risk_usd`, `recoverable_pct` |
66
+ | `simulation` | struct | `synthetic`, `engine`, `chaos_profile`, `ground_truth_classification` |
67
+
68
+ See [SCHEMA.md](./SCHEMA.md) for the full nested field breakdown.
69
+
70
+ ## Why this dataset is useful
71
+
72
+ Most public financial-fraud datasets are either flat tabular snapshots (IEEE-CIS, credit-card fraud) or narrow single-event labels. Real AML / transaction-monitoring models need something these don't provide: **sequences** (warm-up → burst), **ambiguous labels** (legitimate-but-high-risk that looks like fraud), and **detection logic grounded in behavioral patterns** rather than just feature engineering.
73
+
74
+ - Full pre-event dormant and check-in telemetry — not just the burst
75
+ - `burst_indicator` flags at each step so models can learn temporal dynamics explicitly
76
+ - A dedicated false-positive class (`Legitimate_High_Risk_Activity`) with benign ground truth but fraud-adjacent behavior — the exact class that drives real-world FP rates
77
+ - Per-record `detection_logic` in SQL-like form shows how the scenario would be detected in production
78
+ - Per-record `anomaly_score` and `label_confidence` so models can train on calibration targets, not just hard labels
79
+ - Cross-asset (crypto + fiat), cross-geography coverage
80
+
81
+ ## Typical use cases
82
+
83
+ - Fraud-detection model training
84
+ - AML / transaction-monitoring pipelines
85
+ - False-positive-reduction research (reducing customer-experience pain)
86
+ - Risk-scoring systems
87
+ - Account-takeover detection
88
+ - Spoofing / market-manipulation classifiers
89
+ - Temporal-burst anomaly detection
90
+ - LLM fine-tuning on fraud-investigation narratives
91
+ - Benchmarking anomaly scoring against ambiguous ground truth
92
+
93
+ ## Quick start
94
+
95
+ ```python
96
+ import pandas as pd
97
+ import pyarrow.parquet as pq
98
+
99
+ df = pq.read_table("dark_pool_sample.parquet").to_pandas()
100
+
101
+ # Label distribution (mix of fraudulent and benign)
102
+ print(df["event"].apply(lambda e: e["label"]).value_counts())
103
+
104
+ # Average financial exposure by fraud class
105
+ df["cls"] = df["vulnerability"].apply(lambda v: v["fraud_class"])
106
+ df["exposure"] = df["impact"].apply(lambda i: i["financial_exposure_usd"])
107
+ print(df.groupby("cls")["exposure"].mean().round(0))
108
+
109
+ # Burst density by scenario (bursts per sequence)
110
+ df["burst_count"] = df["telemetry_stream"].apply(
111
+ lambda s: sum(1 for step in s if step["burst_indicator"])
112
+ )
113
+ print(df.groupby("cls")["burst_count"].mean().round(2))
114
+
115
+ # False-positive rate signal — proportion of fraudulent-label vs benign per severity
116
+ df["severity"] = df["event"].apply(lambda e: e["severity"])
117
+ df["label"] = df["event"].apply(lambda e: e["label"])
118
+ print(pd.crosstab(df["severity"], df["label"], normalize="index").round(3))
119
+ ```
120
+
121
+ Streaming form:
122
+
123
+ ```python
124
+ import json
125
+
126
+ with open("dark_pool_sample.jsonl") as f:
127
+ for line in f:
128
+ sequence = json.loads(line)
129
+ # one financial activity sequence per line
130
+ ```
131
+
132
+ ## Responsible use
133
+
134
+ This dataset is intended for **defensive / monitoring** use cases: fraud-detection model training, AML research, false-positive reduction, and academic benchmarks. It contains synthesized transaction amounts, synthetic account IDs, and fictional scenario narratives — it does **not** contain real customer data, real transactions, real wallet addresses, or any PII. Models trained on this data will learn fraud-pattern shape and temporal dynamics; downstream deployment for live transaction monitoring requires calibration against institution-specific real-world data under appropriate compliance review.
135
+
136
+ ## License
137
+
138
+ Released under **CC BY 4.0**. Use freely for research, fraud-tool prototyping, education, and commercial development with attribution.
139
+
140
+ ## Get the full pack
141
+
142
+ This Hugging Face repo is a **10K-sequence sample**. The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, parquet + JSONL + SAR-narrative-aligned delivery, and buyer-specific variants.
143
+
144
+ **Self-serve (Stripe checkout):**
145
+ - [**Sample Scale tier — $5,000**](https://buy.stripe.com/7sY5kD2j85QTfSb5lfeEo03) — ~25K records, one subject, 72-hour delivery.
146
+
147
+ **Full pack + enterprise scope:**
148
+ - [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets) — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.
149
+
150
+ **Procurement catalog:**
151
+ - [SolsticeAI Data Storefront](https://solsticeai.mydatastorefront.com) — available via Datarade / Monda.
152
+
153
+ ## Citation
154
+
155
+ ```bibtex
156
+ @dataset{solstice_dark_pool_pack_2026,
157
+ title = {Aestrea Dark Pool Financial Anomaly Pack (Sample)},
158
+ author = {SolsticeAI},
159
+ year = {2026},
160
+ publisher = {Hugging Face},
161
+ url = {https://huggingface.co/datasets/solsticestudioai/dark-pool-pack}
162
+ }
163
+ ```
SCHEMA.md ADDED
@@ -0,0 +1,107 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Aestrea Dark Pool Financial Anomaly Pack — Schema
2
+
3
+ One row = one financial activity sequence (warm-up → burst). All records share the same seven top-level fields.
4
+
5
+ Schema version: `1.0.0-dark-pool-sample`
6
+
7
+ ## Top-level fields
8
+
9
+ ### `schema_version` — string
10
+ Schema identifier. Constant within a sample release.
11
+
12
+ ### `event` — struct
13
+ Identifier fields and the overall label/severity for the sequence.
14
+
15
+ | Field | Type | Notes |
16
+ |---|---|---|
17
+ | `id` | string | Stable event identifier, e.g., `DARKPOOL-100000`. |
18
+ | `trace_id` | string (UUID) | Cross-links telemetry within the sequence. |
19
+ | `timestamp` | string (ISO-8601) | Sequence anchor time (burst start). |
20
+ | `severity` | string | `low`, `medium`, `high`, `critical`. |
21
+ | `label` | string | `fraudulent` or `benign`. |
22
+ | `label_confidence` | double | 0–1. Lower on ambiguous scenarios (false-positive class skews lower). |
23
+
24
+ ### `identity_context` — struct
25
+ Synthetic account-level context.
26
+
27
+ | Field | Type | Notes |
28
+ |---|---|---|
29
+ | `account_id` | string | Synthetic account identifier (e.g., `ACCT-A1B2C3D4E5F6`). |
30
+ | `baseline_risk_score` | double | 0–1. Pre-sequence risk signal. |
31
+ | `session_entropy` | double | 0–1. Unpredictability of session behavior. |
32
+ | `account_age_days` | int | Account age (days). |
33
+ | `kyc_tier` | string | `tier_1`, `tier_2`, `tier_3`. |
34
+
35
+ ### `telemetry_stream` — list<struct>
36
+ Ordered financial telemetry events. One struct per event.
37
+
38
+ Event struct:
39
+
40
+ | Field | Type | Notes |
41
+ |---|---|---|
42
+ | `timestamp` | string (ISO-8601) | Event time. |
43
+ | `event_name` | string | Event label (scenario-specific, e.g., `LARGE_WITHDRAWAL`, `LIMIT_ORDER_CANCELLED`, `LOGIN_NEW_COUNTRY`, `PASSWORD_CHANGE`, `OPPOSITE_SIDE_FILL`, `VACATION_PAYMENT`). |
44
+ | `asset` | string | `BTC`, `ETH`, `USDC`, `USDT`, `SOL`, `USD`, `EUR`, `GBP`, `JPY`. |
45
+ | `transaction_amount_usd` | double | USD-equivalent transaction amount. |
46
+ | `geo_country` | string | ISO-2 country code. |
47
+ | `latency_ms` | int | Observed latency for the event. |
48
+ | `burst_indicator` | bool | `true` during high-frequency burst phase. |
49
+
50
+ ### `vulnerability` — struct
51
+ Scenario classification and exposure vector.
52
+
53
+ | Field | Type | Notes |
54
+ |---|---|---|
55
+ | `fraud_class` | string | `Account_Takeover_Sequence`, `Market_Manipulation_Spoofing`, `Legitimate_High_Risk_Activity`. |
56
+ | `scenario_description` | string | Short English description of the scenario. |
57
+ | `exposure_vector` | string | Primary exposure dimension (e.g., `credential_abuse`, `order_book_spoof`, `geo_anomaly`, `rapid_burst`, `session_hijack`, `benign_travel_pattern`). |
58
+
59
+ ### `detection` — struct
60
+ Anomaly-signature metadata describing how this sequence would be detected in production.
61
+
62
+ | Field | Type | Notes |
63
+ |---|---|---|
64
+ | `anomaly_type` | string | One of: `temporal_burst_sequence`, `cancel_burst_with_opposite_fill`, `geo_travel_with_elevated_spend`. |
65
+ | `baseline_deviation` | string | Short English description of the deviation pattern (includes burst count and geo diversity). |
66
+ | `detection_logic` | string | SQL-like rule expression showing the production-style detector. |
67
+ | `anomaly_score` | double | 0–1. |
68
+ | `confidence_band` | string | `low` / `medium` / `high` / `very_high`. |
69
+
70
+ ### `impact` — struct
71
+ Financial exposure attributable to the sequence.
72
+
73
+ | Field | Type | Notes |
74
+ |---|---|---|
75
+ | `financial_exposure_usd` | double | USD exposure during the burst (scaled down for benign sequences). |
76
+ | `customer_funds_at_risk_usd` | double | USD exposure to customer funds specifically. |
77
+ | `recoverable_pct` | double | 0–1. Estimated recoverable fraction. Lower for account takeovers. |
78
+
79
+ ### `simulation` — struct
80
+ Simulation engine provenance and ground-truth label.
81
+
82
+ | Field | Type | Notes |
83
+ |---|---|---|
84
+ | `synthetic` | bool | Always `true`. |
85
+ | `engine` | string | Simulation engine label (`dark_pool_sim_v1`). |
86
+ | `chaos_profile` | string | `Temporal_Burst_Mode`, `Geo_Travel_Mode`, `Market_Stress_Mode`, `Calm_Baseline`, `Holiday_Season_Spike`. |
87
+ | `ground_truth_classification` | string | `fraudulent` or `benign`. Matches `event.label`. |
88
+
89
+ ## Distribution of this sample
90
+
91
+ - 10,000 sequences total.
92
+ - Fraud class: balanced 3,333 per class across 3 classes (account takeover, spoofing, false-positive).
93
+ - Label: 2/3 `fraudulent`, 1/3 `benign` (by design — only the false-positive class is benign).
94
+ - Severity: scenario-weighted so spoofing skews mid, ATO skews high, false-positive skews low.
95
+ - Anomaly types: each fraud class maps to its own anomaly type.
96
+
97
+ ## Sanitization notes
98
+
99
+ - Event IDs are synthetic (`DARKPOOL-*`).
100
+ - Account IDs are UUID-derived synthetic identifiers (`ACCT-A1B2C3...`).
101
+ - No real customer data, real transactions, real wallet addresses, or PII is present.
102
+ - `detection_logic` is illustrative SQL-style rule syntax; it is not connected to any real detection system.
103
+ - Country codes are used as generic geo labels, not as allegations about any specific jurisdiction's transaction profile.
104
+
105
+ ## Relationship to the full pack
106
+
107
+ The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, and SAR-narrative-aligned delivery. See the pack card for commercial access.
dark_pool_sample.jsonl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:787bad2f33a6aa9870467bd187b8334d1b4c1aa8c022eea38209ada1aac91d3c
3
+ size 25057697
dark_pool_sample.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bdeab1230a9a576d781aa24ca1ea0208391dc45837a3c469baf7a23929377780
3
+ size 2734698