Update README.md
Browse files
README.md
CHANGED
|
@@ -28,6 +28,12 @@ This is a **free preview** of the full **CYB003 — Synthetic Malware Behaviour
|
|
| 28 |
full dataset** at identical schema, family/tier distribution, and statistical
|
| 29 |
fingerprint, so you can evaluate fit before licensing the full product.
|
| 30 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 31 |
| File | Rows (sample) | Rows (full) | Description |
|
| 32 |
|----------------------------|---------------|---------------|------------------------------------------------|
|
| 33 |
| `environment_profiles.csv` | ~100 | ~3,200 | Endpoint environment configurations |
|
|
@@ -53,6 +59,30 @@ stacks with calibrated detection/evasion outcomes, covering:
|
|
| 53 |
- **Outcome modelling**: AV signature detection, EDR behavioural detection,
|
| 54 |
sandbox evasion success, family attribution confidence
|
| 55 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 56 |
## Calibrated Benchmark Targets
|
| 57 |
|
| 58 |
The full product is calibrated to 12 benchmark metrics drawn from
|
|
@@ -126,8 +156,11 @@ event log and endpoint environment schemas respectively.
|
|
| 126 |
|
| 127 |
## Suggested Use Cases
|
| 128 |
|
|
|
|
|
|
|
| 129 |
- Training **malware family classifiers** (9-class with realistic class
|
| 130 |
-
imbalance and family-specific feature distributions
|
|
|
|
| 131 |
- **Threat actor attribution** modelling (4-tier classification)
|
| 132 |
- **EDR detection benchmarking** — packed vs unpacked, signature vs
|
| 133 |
behavioural, fileless vs binary
|
|
@@ -163,6 +196,10 @@ y_tier = summaries["threat_actor_tier"]
|
|
| 163 |
y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
|
| 164 |
```
|
| 165 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 166 |
## License
|
| 167 |
|
| 168 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|
|
|
|
| 28 |
full dataset** at identical schema, family/tier distribution, and statistical
|
| 29 |
fingerprint, so you can evaluate fit before licensing the full product.
|
| 30 |
|
| 31 |
+
> 🤖 **Trained baseline available:**
|
| 32 |
+
> [**xpertsystems/cyb003-baseline-classifier**](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
|
| 33 |
+
> — XGBoost + PyTorch MLP for 10-class malware execution-phase prediction,
|
| 34 |
+
> group-aware split by sample, multi-seed evaluation (accuracy 0.905 ± 0.010),
|
| 35 |
+
> honest disclosure of which tasks need the full dataset.
|
| 36 |
+
|
| 37 |
| File | Rows (sample) | Rows (full) | Description |
|
| 38 |
|----------------------------|---------------|---------------|------------------------------------------------|
|
| 39 |
| `environment_profiles.csv` | ~100 | ~3,200 | Endpoint environment configurations |
|
|
|
|
| 59 |
- **Outcome modelling**: AV signature detection, EDR behavioural detection,
|
| 60 |
sandbox evasion success, family attribution confidence
|
| 61 |
|
| 62 |
+
## Trained Baseline Available
|
| 63 |
+
|
| 64 |
+
A working baseline classifier trained on this sample is published at
|
| 65 |
+
**[xpertsystems/cyb003-baseline-classifier](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)**.
|
| 66 |
+
|
| 67 |
+
| Component | Detail |
|
| 68 |
+
|---|---|
|
| 69 |
+
| Task | 10-class malware execution-phase classification |
|
| 70 |
+
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
|
| 71 |
+
| Features | 69 (after one-hot encoding); pipeline included as `feature_engineering.py` |
|
| 72 |
+
| Split | **Group-aware by sample_id** — train/val/test samples disjoint |
|
| 73 |
+
| Validation | Single seed + multi-seed aggregate across 10 seeds |
|
| 74 |
+
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
|
| 75 |
+
| Headline metrics | XGBoost: accuracy 0.905 ± 0.010, macro ROC-AUC 0.975 ± 0.002 (multi-seed) |
|
| 76 |
+
|
| 77 |
+
The model card documents an honest finding worth knowing before licensing:
|
| 78 |
+
**malware-family classification is at majority baseline on the sample's 100
|
| 79 |
+
samples** (a sample-size constraint, not a method failure — the full
|
| 80 |
+
280k-row dataset has ~5,600 samples and supports family classification
|
| 81 |
+
properly). The baseline pivots to **execution-phase prediction**, which is
|
| 82 |
+
strongly learnable on the sample data (91% accuracy, ROC-AUC 0.98, stable
|
| 83 |
+
across 10 seeds) and is itself a real SOC use case for dynamic-analysis
|
| 84 |
+
and EDR phase tagging.
|
| 85 |
+
|
| 86 |
## Calibrated Benchmark Targets
|
| 87 |
|
| 88 |
The full product is calibrated to 12 benchmark metrics drawn from
|
|
|
|
| 156 |
|
| 157 |
## Suggested Use Cases
|
| 158 |
|
| 159 |
+
- Training **malware execution-phase classifiers** —
|
| 160 |
+
[worked example available](https://huggingface.co/xpertsystems/cyb003-baseline-classifier)
|
| 161 |
- Training **malware family classifiers** (9-class with realistic class
|
| 162 |
+
imbalance and family-specific feature distributions — full dataset
|
| 163 |
+
recommended for adequate per-class sample size)
|
| 164 |
- **Threat actor attribution** modelling (4-tier classification)
|
| 165 |
- **EDR detection benchmarking** — packed vs unpacked, signature vs
|
| 166 |
behavioural, fileless vs binary
|
|
|
|
| 196 |
y_detected = (samples["av_detected"] | samples["edr_detected"]).astype(int)
|
| 197 |
```
|
| 198 |
|
| 199 |
+
For a worked end-to-end example with execution-phase classification,
|
| 200 |
+
group-aware splitting, and feature engineering, see the inference notebook
|
| 201 |
+
in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb003-baseline-classifier/blob/main/inference_example.ipynb).
|
| 202 |
+
|
| 203 |
## License
|
| 204 |
|
| 205 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|