Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breaches

IF 1 Q3 MULTIDISCIPLINARY SCIENCES Data in Brief Pub Date : 2025-02-01 DOI:10.1016/j.dib.2024.111207
Abhishek Sharma , May Bantan
{"title":"Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breaches","authors":"Abhishek Sharma ,&nbsp;May Bantan","doi":"10.1016/j.dib.2024.111207","DOIUrl":null,"url":null,"abstract":"<div><div>With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. Also, it raises the question of how hackers can create a profile of an individual starting from one data leak and getting more details on individuals with the help of Open Source Intelligence (OSINT). Furthermore, there is a dilemma in utilizing data breach datasets dumped on the clear web or the dark web because of the sensitive nature of the information. There can be issues related to ethics, law enforcement, and legal use of data. Thus, to tackle this, we will construct synthetic datasets that will allow researchers and professionals to understand how data leaks can be dangerous and how hackers can connect the dots further by creating complete profiles of individuals. We have programmatically generated a synthetic master record of 4 million unique individuals with complete profiles of their PIIs, and then using the master record, we have further generated 16 scenario-based datasets by creating a fictitious narrative of data breaches covering different industry types. These datasets will facilitate researchers and industry professionals in understanding the distribution of PIIs across data breaches. The data classes represent the nature of PIIs sourced from ‘Have I Been Pwned?’ to create synthetic records. The synthetically generated records are shared with the code in this paper to facilitate future researchers and practitioners to generate customized synthetic records according to their requirements, enabling transparency in terms of reusability, reproducibility, and replicability.</div></div>","PeriodicalId":10973,"journal":{"name":"Data in Brief","volume":"58 ","pages":"Article 111207"},"PeriodicalIF":1.0000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11699479/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Data in Brief","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2352340924011697","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

Abstract

With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. Also, it raises the question of how hackers can create a profile of an individual starting from one data leak and getting more details on individuals with the help of Open Source Intelligence (OSINT). Furthermore, there is a dilemma in utilizing data breach datasets dumped on the clear web or the dark web because of the sensitive nature of the information. There can be issues related to ethics, law enforcement, and legal use of data. Thus, to tackle this, we will construct synthetic datasets that will allow researchers and professionals to understand how data leaks can be dangerous and how hackers can connect the dots further by creating complete profiles of individuals. We have programmatically generated a synthetic master record of 4 million unique individuals with complete profiles of their PIIs, and then using the master record, we have further generated 16 scenario-based datasets by creating a fictitious narrative of data breaches covering different industry types. These datasets will facilitate researchers and industry professionals in understanding the distribution of PIIs across data breaches. The data classes represent the nature of PIIs sourced from ‘Have I Been Pwned?’ to create synthetic records. The synthetically generated records are shared with the code in this paper to facilitate future researchers and practitioners to generate customized synthetic records according to their requirements, enabling transparency in terms of reusability, reproducibility, and replicability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
模拟数据泄露:通过基于场景的泄露来描述个人可识别信息的合成数据集。
随着黑客无情地破坏网络空间和全球组织的日常运作,个人身份信息(PII)也引起了人们的关注。由于数据泄露和数据被倾倒在明网或暗网上,人们非常担心全球不同的威胁行为者如何滥用数据。此外,它还提出了一个问题,即黑客如何从一次数据泄露开始创建个人档案,并在开源情报(OSINT)的帮助下获得个人的更多细节。此外,由于信息的敏感性,在利用透明网或暗网上转储的数据泄露数据集时存在两难境地。可能存在与道德、执法和合法使用数据相关的问题。因此,为了解决这个问题,我们将构建合成数据集,让研究人员和专业人士了解数据泄露是如何危险的,以及黑客如何通过创建完整的个人资料进一步将这些点联系起来。我们以编程方式生成了一个包含400万个人的合成主记录,其中包含他们的个人身份信息的完整配置文件,然后使用主记录,我们通过创建涵盖不同行业类型的数据泄露的虚构叙述,进一步生成了16个基于场景的数据集。这些数据集将有助于研究人员和行业专业人士了解个人信息在数据泄露中的分布。数据类表示来自“我被打败了吗?”来创建合成记录。本文将合成生成的记录与代码共享,以方便未来的研究人员和从业者根据自己的需求生成定制的合成记录,从而在可重用性、可再现性和可复制性方面实现透明。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Data in Brief
Data in Brief MULTIDISCIPLINARY SCIENCES-
CiteScore
3.10
自引率
0.00%
发文量
996
审稿时长
70 days
期刊介绍: Data in Brief provides a way for researchers to easily share and reuse each other''s datasets by publishing data articles that: -Thoroughly describe your data, facilitating reproducibility. -Make your data, which is often buried in supplementary material, easier to find. -Increase traffic towards associated research articles and data, leading to more citations. -Open up doors for new collaborations. Because you never know what data will be useful to someone else, Data in Brief welcomes submissions that describe data from all research areas.
期刊最新文献
Data on hydrodynamic flow and aspiration mechanisms in a patient-specific pharyngolaryngeal model with variable epiglottis angles Dataset and analysis of automated and manual methods to differentiate wide QRS complex tachycardias AnaDetect: An extensive dataset for advancing anemia detection, diagnostic methods, and predictive analytics in healthcare Comprehensive collection of uniaxial stress-strain data for rubberized concrete Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breaches
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1