Datasets:
Aestrea Dark Pool Financial Anomaly Pack — Schema
One row = one financial activity sequence (warm-up → burst). All records share the same seven top-level fields.
Schema version: 1.0.0-dark-pool-sample
Top-level fields
schema_version — string
Schema identifier. Constant within a sample release.
event — struct
Identifier fields and the overall label/severity for the sequence.
| Field | Type | Notes |
|---|---|---|
id |
string | Stable event identifier, e.g., DARKPOOL-100000. |
trace_id |
string (UUID) | Cross-links telemetry within the sequence. |
timestamp |
string (ISO-8601) | Sequence anchor time (burst start). |
severity |
string | low, medium, high, critical. |
label |
string | fraudulent or benign. |
label_confidence |
double | 0–1. Lower on ambiguous scenarios (false-positive class skews lower). |
identity_context — struct
Synthetic account-level context.
| Field | Type | Notes |
|---|---|---|
account_id |
string | Synthetic account identifier (e.g., ACCT-A1B2C3D4E5F6). |
baseline_risk_score |
double | 0–1. Pre-sequence risk signal. |
session_entropy |
double | 0–1. Unpredictability of session behavior. |
account_age_days |
int | Account age (days). |
kyc_tier |
string | tier_1, tier_2, tier_3. |
telemetry_stream — list
Ordered financial telemetry events. One struct per event.
Event struct:
| Field | Type | Notes |
|---|---|---|
timestamp |
string (ISO-8601) | Event time. |
event_name |
string | Event label (scenario-specific, e.g., LARGE_WITHDRAWAL, LIMIT_ORDER_CANCELLED, LOGIN_NEW_COUNTRY, PASSWORD_CHANGE, OPPOSITE_SIDE_FILL, VACATION_PAYMENT). |
asset |
string | BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY. |
transaction_amount_usd |
double | USD-equivalent transaction amount. |
geo_country |
string | ISO-2 country code. |
latency_ms |
int | Observed latency for the event. |
burst_indicator |
bool | true during high-frequency burst phase. |
vulnerability — struct
Scenario classification and exposure vector.
| Field | Type | Notes |
|---|---|---|
fraud_class |
string | Account_Takeover_Sequence, Market_Manipulation_Spoofing, Legitimate_High_Risk_Activity. |
scenario_description |
string | Short English description of the scenario. |
exposure_vector |
string | Primary exposure dimension (e.g., credential_abuse, order_book_spoof, geo_anomaly, rapid_burst, session_hijack, benign_travel_pattern). |
detection — struct
Anomaly-signature metadata describing how this sequence would be detected in production.
| Field | Type | Notes |
|---|---|---|
anomaly_type |
string | One of: temporal_burst_sequence, cancel_burst_with_opposite_fill, geo_travel_with_elevated_spend. |
baseline_deviation |
string | Short English description of the deviation pattern (includes burst count and geo diversity). |
detection_logic |
string | SQL-like rule expression showing the production-style detector. |
anomaly_score |
double | 0–1. |
confidence_band |
string | low / medium / high / very_high. |
impact — struct
Financial exposure attributable to the sequence.
| Field | Type | Notes |
|---|---|---|
financial_exposure_usd |
double | USD exposure during the burst (scaled down for benign sequences). |
customer_funds_at_risk_usd |
double | USD exposure to customer funds specifically. |
recoverable_pct |
double | 0–1. Estimated recoverable fraction. Lower for account takeovers. |
simulation — struct
Simulation engine provenance and ground-truth label.
| Field | Type | Notes |
|---|---|---|
synthetic |
bool | Always true. |
engine |
string | Simulation engine label (dark_pool_sim_v1). |
chaos_profile |
string | Temporal_Burst_Mode, Geo_Travel_Mode, Market_Stress_Mode, Calm_Baseline, Holiday_Season_Spike. |
ground_truth_classification |
string | fraudulent or benign. Matches event.label. |
Distribution of this sample
- 10,000 sequences total.
- Fraud class: balanced 3,333 per class across 3 classes (account takeover, spoofing, false-positive).
- Label: 2/3
fraudulent, 1/3benign(by design — only the false-positive class is benign). - Severity: scenario-weighted so spoofing skews mid, ATO skews high, false-positive skews low.
- Anomaly types: each fraud class maps to its own anomaly type.
Sanitization notes
- Event IDs are synthetic (
DARKPOOL-*). - Account IDs are UUID-derived synthetic identifiers (
ACCT-A1B2C3...). - No real customer data, real transactions, real wallet addresses, or PII is present.
detection_logicis illustrative SQL-style rule syntax; it is not connected to any real detection system.- Country codes are used as generic geo labels, not as allegations about any specific jurisdiction's transaction profile.
Relationship to the full pack
The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, and SAR-narrative-aligned delivery. See the pack card for commercial access.