Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns ab...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2025-02-01
|
Series: | Data in Brief |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352340924011697 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832576516587782144 |
---|---|
author | Abhishek Sharma May Bantan |
author_facet | Abhishek Sharma May Bantan |
author_sort | Abhishek Sharma |
collection | DOAJ |
description | With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. Also, it raises the question of how hackers can create a profile of an individual starting from one data leak and getting more details on individuals with the help of Open Source Intelligence (OSINT). Furthermore, there is a dilemma in utilizing data breach datasets dumped on the clear web or the dark web because of the sensitive nature of the information. There can be issues related to ethics, law enforcement, and legal use of data. Thus, to tackle this, we will construct synthetic datasets that will allow researchers and professionals to understand how data leaks can be dangerous and how hackers can connect the dots further by creating complete profiles of individuals. We have programmatically generated a synthetic master record of 4 million unique individuals with complete profiles of their PIIs, and then using the master record, we have further generated 16 scenario-based datasets by creating a fictitious narrative of data breaches covering different industry types. These datasets will facilitate researchers and industry professionals in understanding the distribution of PIIs across data breaches. The data classes represent the nature of PIIs sourced from ‘Have I Been Pwned?’ to create synthetic records. The synthetically generated records are shared with the code in this paper to facilitate future researchers and practitioners to generate customized synthetic records according to their requirements, enabling transparency in terms of reusability, reproducibility, and replicability. |
format | Article |
id | doaj-art-e8ba77f774374339bb1101579ee5fd96 |
institution | Kabale University |
issn | 2352-3409 |
language | English |
publishDate | 2025-02-01 |
publisher | Elsevier |
record_format | Article |
series | Data in Brief |
spelling | doaj-art-e8ba77f774374339bb1101579ee5fd962025-01-31T05:11:30ZengElsevierData in Brief2352-34092025-02-0158111207Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley DataAbhishek Sharma0May Bantan1Indian Institute of Technology Madras, IndiaKennesaw State University, United States; Corresponding author.With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. Also, it raises the question of how hackers can create a profile of an individual starting from one data leak and getting more details on individuals with the help of Open Source Intelligence (OSINT). Furthermore, there is a dilemma in utilizing data breach datasets dumped on the clear web or the dark web because of the sensitive nature of the information. There can be issues related to ethics, law enforcement, and legal use of data. Thus, to tackle this, we will construct synthetic datasets that will allow researchers and professionals to understand how data leaks can be dangerous and how hackers can connect the dots further by creating complete profiles of individuals. We have programmatically generated a synthetic master record of 4 million unique individuals with complete profiles of their PIIs, and then using the master record, we have further generated 16 scenario-based datasets by creating a fictitious narrative of data breaches covering different industry types. These datasets will facilitate researchers and industry professionals in understanding the distribution of PIIs across data breaches. The data classes represent the nature of PIIs sourced from ‘Have I Been Pwned?’ to create synthetic records. The synthetically generated records are shared with the code in this paper to facilitate future researchers and practitioners to generate customized synthetic records according to their requirements, enabling transparency in terms of reusability, reproducibility, and replicability.http://www.sciencedirect.com/science/article/pii/S2352340924011697Synthetic data generationData breachPersonally Identifiable Information (PIIs)Data classesHacked data dumps |
spellingShingle | Abhishek Sharma May Bantan Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data Data in Brief Synthetic data generation Data breach Personally Identifiable Information (PIIs) Data classes Hacked data dumps |
title | Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data |
title_full | Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data |
title_fullStr | Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data |
title_full_unstemmed | Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data |
title_short | Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data |
title_sort | simulating data breaches synthetic datasets for depicting personally identifiable information through scenario based breachesmendeley datamendeley data |
topic | Synthetic data generation Data breach Personally Identifiable Information (PIIs) Data classes Hacked data dumps |
url | http://www.sciencedirect.com/science/article/pii/S2352340924011697 |
work_keys_str_mv | AT abhisheksharma simulatingdatabreachessyntheticdatasetsfordepictingpersonallyidentifiableinformationthroughscenariobasedbreachesmendeleydatamendeleydata AT maybantan simulatingdatabreachessyntheticdatasetsfordepictingpersonallyidentifiableinformationthroughscenariobasedbreachesmendeleydatamendeleydata |