pradeep-xpert commited on
Commit
d21df06
·
verified ·
1 Parent(s): 8d56c30

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +45 -6
README.md CHANGED
@@ -28,6 +28,13 @@ Dataset** product. It contains roughly **~10% of the full dataset** at
28
  identical schema, actor-tier distribution, and statistical fingerprint, so
29
  you can evaluate fit before licensing the full product.
30
 
 
 
 
 
 
 
 
31
  | File | Rows (sample) | Rows (full) | Description |
32
  |-------------------------------|---------------|---------------|----------------------------------------------|
33
  | `org_topology.csv` | ~240 | ~2,400 | Department / org structure registry |
@@ -59,6 +66,32 @@ defender modeling, covering:
59
  - **Sabotage outcomes** — destructive insider actions distinct from
60
  exfiltration
61
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
62
  ## Calibrated Benchmark Targets
63
 
64
  The full product is calibrated to 12 benchmark validation tests drawn from
@@ -134,7 +167,9 @@ and department registry schemas respectively.
134
 
135
  ## Suggested Use Cases
136
 
137
- - Training **insider threat classifier** models (4-tier actor attribution)
 
 
138
  - **Data exfiltration detection** modelling — DLP signal calibration
139
  - **UEBA effectiveness benchmarking** — graduated 8-tier defender maturity
140
  - **HR-signal correlation** — disgruntlement, resignation, performance
@@ -160,16 +195,20 @@ topology = pd.read_csv("org_topology.csv")
160
  enriched = trajectories.merge(incidents, on=["incident_id", "actor_id"],
161
  how="left", suffixes=("", "_summary"))
162
 
163
- # 4-class threat-type classification target
164
- y_tier = incidents["threat_type_tier"]
165
 
166
  # Binary exfiltration-success target
167
- y_exfil = incidents["exfiltration_success_flag"]
168
 
169
- # Binary collusion target
170
- y_collusion = incidents["collusion_flag"]
171
  ```
172
 
 
 
 
 
173
  ## License
174
 
175
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
 
28
  identical schema, actor-tier distribution, and statistical fingerprint, so
29
  you can evaluate fit before licensing the full product.
30
 
31
+ > 🤖 **Trained baseline available:**
32
+ > [**xpertsystems/cyb007-baseline-classifier**](https://huggingface.co/xpertsystems/cyb007-baseline-classifier)
33
+ > — XGBoost + PyTorch MLP for **3-tier insider threat type classification**
34
+ > (the README's stated headline use case), group-aware split by incident,
35
+ > multi-seed evaluation (ROC-AUC 0.961 ± 0.007), honest leakage audit of
36
+ > tier-correlated volume features.
37
+
38
  | File | Rows (sample) | Rows (full) | Description |
39
  |-------------------------------|---------------|---------------|----------------------------------------------|
40
  | `org_topology.csv` | ~240 | ~2,400 | Department / org structure registry |
 
66
  - **Sabotage outcomes** — destructive insider actions distinct from
67
  exfiltration
68
 
69
+ ## Trained Baseline Available
70
+
71
+ A working baseline classifier trained on this sample is published at
72
+ **[xpertsystems/cyb007-baseline-classifier](https://huggingface.co/xpertsystems/cyb007-baseline-classifier)**.
73
+
74
+ | Component | Detail |
75
+ |---|---|
76
+ | Task | **3-class insider threat type classification** (the README's headline use case) |
77
+ | Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
78
+ | Features | 28 (after one-hot encoding); pipeline included as `feature_engineering.py` |
79
+ | Split | **Group-aware by incident_id** — train/val/test incidents disjoint |
80
+ | Validation | Single seed + multi-seed aggregate across 10 seeds |
81
+ | Demo | `inference_example.ipynb` — end-to-end copy-paste |
82
+ | Headline metrics | XGBoost: accuracy 0.855 ± 0.012, macro ROC-AUC 0.961 ± 0.007 (multi-seed); MLP slightly outperforms (acc 0.869, AUC 0.966 at seed 42) |
83
+
84
+ This is the **second XpertSystems baseline to ship the dataset's stated
85
+ headline use case** (after CYB005). CYB007's 500-incident sample is large
86
+ enough that tier attribution learns honestly under group-aware splitting,
87
+ with no oracle features and very tight multi-seed std.
88
+
89
+ **Important schema note for buyers:** the dataset README documents a
90
+ 4-tier scheme including `compromised_account`, but the sample contains
91
+ only 3 of those 4 tiers. The baseline trains on what exists in the
92
+ sample. See the baseline model card for the full list of schema
93
+ discrepancies between README and data.
94
+
95
  ## Calibrated Benchmark Targets
96
 
97
  The full product is calibrated to 12 benchmark validation tests drawn from
 
167
 
168
  ## Suggested Use Cases
169
 
170
+ - Training **insider threat classifier** models (3-tier actor attribution
171
+ on the sample, 4-tier on the full product) —
172
+ [worked example available](https://huggingface.co/xpertsystems/cyb007-baseline-classifier)
173
  - **Data exfiltration detection** modelling — DLP signal calibration
174
  - **UEBA effectiveness benchmarking** — graduated 8-tier defender maturity
175
  - **HR-signal correlation** — disgruntlement, resignation, performance
 
195
  enriched = trajectories.merge(incidents, on=["incident_id", "actor_id"],
196
  how="left", suffixes=("", "_summary"))
197
 
198
+ # 3-class threat-type classification target (sample contains 3 of 4 README tiers)
199
+ y_tier = trajectories["actor_threat_type"]
200
 
201
  # Binary exfiltration-success target
202
+ y_exfil = incidents["exfiltration_successes"] > 0
203
 
204
+ # Binary coordinated-incident target
205
+ y_coord = incidents["coordinated_incident_flag"]
206
  ```
207
 
208
+ For a worked end-to-end example with insider-threat tier classification,
209
+ group-aware splitting, and feature engineering, see the inference notebook
210
+ in the [baseline classifier repo](https://huggingface.co/xpertsystems/cyb007-baseline-classifier/blob/main/inference_example.ipynb).
211
+
212
  ## License
213
 
214
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial