pradeep-xpert commited on
Commit
1044ccd
·
verified ·
1 Parent(s): 7426505

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +44 -4
README.md CHANGED
@@ -28,6 +28,14 @@ Dataset** product. It contains roughly **~1.3% of the full dataset** at
28
  identical schema, threat-actor-tier distribution, and statistical fingerprint,
29
  so you can evaluate fit before licensing the full product.
30
 
 
 
 
 
 
 
 
 
31
  | File | Rows (sample) | Rows (full) | Description |
32
  |----------------------------|---------------|---------------|----------------------------------------------|
33
  | `identity_topology.csv` | ~150 | ~3,200 | Identity domain registry |
@@ -58,6 +66,33 @@ machine** across diverse identity infrastructures, with:
58
  - **Conditional Access (CA) policy enforcement** modeling — ZTNA block
59
  strength tunable per architecture
60
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
61
  ## Calibrated Benchmark Targets
62
 
63
  The full product is calibrated to **12 benchmark validation tests** drawn
@@ -161,15 +196,16 @@ identity domain schemas respectively.
161
 
162
  ## Suggested Use Cases
163
 
164
- - Training **account takeover (ATO) detection** models
165
- - **Threat-actor tier classification** — 4-class with realistic class imbalance
 
 
166
  - **Impossible travel detection** — geo-velocity feature engineering
167
  - **MFA bypass detection** — distinguish FIDO2 anomalies from push fatigue
168
  - **Lateral movement detection** — session-graph traversal patterns
169
  - **Golden Ticket / Pass-the-Hash** detection benchmarking
170
  - **UEBA precision/recall tuning** with calibrated false-positive baselines
171
  - **Conditional Access policy effectiveness** simulation
172
- - **Insider threat scoring** with composite behavioral indicators
173
  - **Zero Trust posture validation** — ZTNA block rate analysis
174
 
175
  ## Loading the Data
@@ -186,7 +222,7 @@ domains = pd.read_csv("identity_topology.csv")
186
  enriched = sessions.merge(users, on="user_id", how="left",
187
  suffixes=("", "_user"))
188
 
189
- # Threat-actor tier classification target (4-class)
190
  y_tier = sessions["threat_actor_capability_tier"]
191
 
192
  # Binary account-takeover detection target
@@ -196,6 +232,10 @@ y_ato = users["account_takeover_flag"]
196
  y_it = sessions["impossible_travel_flag"]
197
  ```
198
 
 
 
 
 
199
  ## License
200
 
201
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
 
28
  identical schema, threat-actor-tier distribution, and statistical fingerprint,
29
  so you can evaluate fit before licensing the full product.
30
 
31
+ > 🤖 **Trained baseline available:**
32
+ > [**xpertsystems/cyb006-baseline-classifier**](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)
33
+ > — XGBoost + PyTorch MLP for **3-class user-risk-tier classification**
34
+ > (insider-threat scoring use case), stratified split, multi-seed evaluation
35
+ > (ROC-AUC 0.812 ± 0.048). **Includes a structural-leakage diagnostic on
36
+ > the threat-actor detection task** that buyers planning ATO / threat-actor
37
+ > ML work should read first.
38
+
39
  | File | Rows (sample) | Rows (full) | Description |
40
  |----------------------------|---------------|---------------|----------------------------------------------|
41
  | `identity_topology.csv` | ~150 | ~3,200 | Identity domain registry |
 
66
  - **Conditional Access (CA) policy enforcement** modeling — ZTNA block
67
  strength tunable per architecture
68
 
69
+ ## Trained Baseline Available
70
+
71
+ A working baseline classifier trained on this sample is published at
72
+ **[xpertsystems/cyb006-baseline-classifier](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)**.
73
+
74
+ | Component | Detail |
75
+ |---|---|
76
+ | Primary task | **3-class user_risk_tier classification** (insider-threat scoring) |
77
+ | Diagnostic | Audit of threat-actor detection on this sample (see `leakage_diagnostic.json`) |
78
+ | Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
79
+ | Features | 34 per-user features (aggregates + non-leaky session aggregates + engineered) |
80
+ | Split | **Stratified by user_risk_tier** — user-level task, n=200 |
81
+ | Validation | Single seed + multi-seed aggregate across 10 seeds |
82
+ | Demo | `inference_example.ipynb` — end-to-end copy-paste |
83
+ | Headline metrics | XGBoost: accuracy 0.700 ± 0.082, macro ROC-AUC 0.812 ± 0.048 (multi-seed) |
84
+
85
+ **Important diagnostic finding for buyers planning threat-actor detection
86
+ work:** the model card documents that this sample's threat-actor-vs-legitimate
87
+ session populations have **non-overlapping anomaly score distributions**
88
+ across at least six feature groups (velocity, timestamp, credential attempt
89
+ count, login outcome, geo country, device trust). As a result, a plain
90
+ XGBoost achieves 100% test accuracy on threat-actor binary detection that
91
+ does not reflect real-world detection difficulty. The baseline model
92
+ targets `user_risk_tier` instead, which is a legitimate ML task on the
93
+ sample. See the model card's [Leakage diagnostic](https://huggingface.co/xpertsystems/cyb006-baseline-classifier#leakage-diagnostic)
94
+ section for the full audit and recommendations.
95
+
96
  ## Calibrated Benchmark Targets
97
 
98
  The full product is calibrated to **12 benchmark validation tests** drawn
 
196
 
197
  ## Suggested Use Cases
198
 
199
+ - Training **insider threat scoring** models
200
+ [worked example available](https://huggingface.co/xpertsystems/cyb006-baseline-classifier)
201
+ - **Account takeover (ATO) detection** model development (see leakage diagnostic in the baseline model card before training)
202
+ - **Threat-actor tier classification** — 4-class with realistic class imbalance (see leakage diagnostic before training)
203
  - **Impossible travel detection** — geo-velocity feature engineering
204
  - **MFA bypass detection** — distinguish FIDO2 anomalies from push fatigue
205
  - **Lateral movement detection** — session-graph traversal patterns
206
  - **Golden Ticket / Pass-the-Hash** detection benchmarking
207
  - **UEBA precision/recall tuning** with calibrated false-positive baselines
208
  - **Conditional Access policy effectiveness** simulation
 
209
  - **Zero Trust posture validation** — ZTNA block rate analysis
210
 
211
  ## Loading the Data
 
222
  enriched = sessions.merge(users, on="user_id", how="left",
223
  suffixes=("", "_user"))
224
 
225
+ # Threat-actor tier classification target (4-class) — see leakage diagnostic
226
  y_tier = sessions["threat_actor_capability_tier"]
227
 
228
  # Binary account-takeover detection target
 
232
  y_it = sessions["impossible_travel_flag"]
233
  ```
234
 
235
+ For a worked end-to-end example with user-risk-tier classification,
236
+ stratified splitting, and feature engineering, see the inference notebook
237
+ in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb006-baseline-classifier/blob/main/inference_example.ipynb).
238
+
239
  ## License
240
 
241
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial