pradeep-xpert commited on
Commit
c5653a9
·
verified ·
1 Parent(s): f11c846

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +87 -15
README.md CHANGED
@@ -16,7 +16,7 @@ tags:
16
  - zero-day
17
  pretty_name: CYB009 — Synthetic Vulnerability Intelligence (Sample)
18
  size_categories:
19
- - 10K<n<100K
20
  ---
21
 
22
  # CYB009 — Synthetic Vulnerability Intelligence Dataset (Sample)
@@ -29,6 +29,27 @@ dataset rows** (but generated from ~40% the org/asset count) at identical
29
  schema, CVSS distribution, and statistical fingerprint, so you can
30
  evaluate fit before licensing the full product.
31
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
32
  *Note: This sample is larger than other CYB SKU samples (~45 MB total).
33
  CYB009 has subset-conditional benchmarks (CISA KEV listing rate, supply
34
  chain propagation) that need a reasonable vulnerability population to
@@ -68,6 +89,50 @@ CISA KEV modeling, covering:
68
  - **Compensating controls and risk acceptance** outcomes
69
  - **Internet-exposed asset modeling** — 38% exposure baseline
70
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
71
  ## Calibrated Benchmark Targets
72
 
73
  The full product is calibrated to 12 benchmark validation tests drawn from
@@ -150,21 +215,23 @@ event log and asset registry schemas respectively.
150
 
151
  ## Suggested Use Cases
152
 
 
 
153
  - Training **vulnerability triage** models — predict CVSS/EPSS-prioritized
154
  remediation order
155
  - **Zero-day prediction** — feature engineering from pre-disclosure
156
- telemetry
157
- - **CISA KEV listing prediction** — early-warning for emergency patching
158
- - **Supply chain compromise detection** — SBOM signal modeling
159
  - **Patch deployment ETA forecasting** — per-class patch development
160
  duration prediction
161
- - **SLA breach prediction** — early-warning for at-risk vulnerabilities
162
  - **Asset criticality classification** from inventory features
163
- - **EPSS calibration validation** — empirical vs predicted exploitation
164
  - **Compensating control effectiveness** modeling
165
  - **Risk acceptance decision** modeling — predict which vulns get
166
  accepted vs remediated
167
- - **Lifecycle phase transition prediction** — multi-class sequence modeling
168
 
169
  ## Loading the Data
170
 
@@ -181,19 +248,24 @@ enriched = records.merge(vulns, on=["vuln_id", "asset_id"], how="left",
181
  suffixes=("", "_summary"))
182
  enriched = enriched.merge(assets, on="asset_id", how="left")
183
 
184
- # Binary exploitation-in-wild target
185
- y_exploited = vulns["exploited_in_wild"]
186
 
187
- # Binary CISA KEV listing target (rare event ~6.5%)
188
- y_kev = vulns["cisa_kev_listed"]
189
 
190
- # Multi-class vulnerability classification
191
- y_class = vulns["vuln_class"]
192
 
193
- # Binary SLA breach prediction
194
- y_sla = records["sla_breached_flag"]
195
  ```
196
 
 
 
 
 
 
197
  ## License
198
 
199
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
 
16
  - zero-day
17
  pretty_name: CYB009 — Synthetic Vulnerability Intelligence (Sample)
18
  size_categories:
19
+ - 100K<n<1M
20
  ---
21
 
22
  # CYB009 — Synthetic Vulnerability Intelligence Dataset (Sample)
 
29
  schema, CVSS distribution, and statistical fingerprint, so you can
30
  evaluate fit before licensing the full product.
31
 
32
+ > 🤖 **Trained baseline + comprehensive leakage audit available:**
33
+ > [**xpertsystems/cyb009-baseline-classifier**](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)
34
+ > — XGBoost + PyTorch MLP for **8-class vulnerability classification**
35
+ > (acc 0.244 ± 0.023, ROC-AUC 0.687 ± 0.014). **The primary artifact
36
+ > is `leakage_diagnostic.json`** — the XpertSystems catalog's most
37
+ > comprehensive structural-leakage audit, documenting 8 oracle paths
38
+ > and 6 README-suggested headline targets that are unlearnable on the
39
+ > sample after honest leak removal. Buyers planning CYB009 ML work
40
+ > should read the diagnostic first.
41
+
42
+ > ⚠️ **Important: most README-suggested ML targets are not viable on
43
+ > this sample.** The baseline's leakage diagnostic documents that
44
+ > `exploit_maturity_final`, `exploitation_occurred_flag`,
45
+ > `zero_day_flag`, `cisa_kev_flag`,
46
+ > `supply_chain_propagation_flag`, `false_positive_flag`, and the
47
+ > per-timestep `lifecycle_phase` / `patch_status` / `remediation_status`
48
+ > targets all have structural label-feature determinism that makes
49
+ > them either trivially solvable via oracle features or unlearnable
50
+ > after honest leak removal. The dataset is still useful for
51
+ > evaluation, but ML training requires careful target selection.
52
+
53
  *Note: This sample is larger than other CYB SKU samples (~45 MB total).
54
  CYB009 has subset-conditional benchmarks (CISA KEV listing rate, supply
55
  chain propagation) that need a reasonable vulnerability population to
 
89
  - **Compensating controls and risk acceptance** outcomes
90
  - **Internet-exposed asset modeling** — 38% exposure baseline
91
 
92
+ ## Trained Baseline + Leakage Audit Available
93
+
94
+ A working baseline classifier + comprehensive leakage diagnostic is
95
+ published at
96
+ **[xpertsystems/cyb009-baseline-classifier](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)**.
97
+
98
+ | Component | Detail |
99
+ |---|---|
100
+ | **Primary artifact** | **`leakage_diagnostic.json`** — 8 oracle paths + 6 unlearnable targets documented |
101
+ | Secondary artifact | 8-class `vulnerability_class` baseline (XGBoost + PyTorch MLP) |
102
+ | Models | `model_xgb.json` + `model_mlp.safetensors` |
103
+ | Features | 57 (after one-hot encoding); pipeline included as `feature_engineering.py` |
104
+ | Split | Stratified random (per-vulnerability) |
105
+ | Validation | Single seed + multi-seed aggregate across 10 seeds |
106
+ | Demo | `inference_example.ipynb` — end-to-end copy-paste |
107
+ | Headline metrics | XGBoost: accuracy 0.244 ± 0.023, macro ROC-AUC 0.687 ± 0.014 (multi-seed) — the catalog's weakest baseline by design |
108
+
109
+ **Findings for buyers planning CYB009 ML work** (full detail in
110
+ [`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb009-baseline-classifier/blob/main/leakage_diagnostic.json)):
111
+
112
+ **8 oracle paths discovered on the sample:**
113
+
114
+ 1. `cvss_temporal_score_final / cvss_base_score` ratio is near-deterministic per `exploit_maturity_final` tier (CVSS v3.1 multipliers 0.91/0.94/0.97/1.00)
115
+ 2. `time_to_exploit_days` (-1 sentinel) is a perfect oracle for `exploitation_occurred_flag`
116
+ 3. `time_to_remediate_days` (120 sentinel) is a perfect oracle for `remediation_success_flag` and `sla_compliance_flag`
117
+ 4. `severity_class` is a 100% mechanical function of `cvss_base_score` (CVSS v3.1 boundaries)
118
+ 5. Five `lifecycle_phase` values pin `remediation_status` deterministically (`residual_risk_review` → 100% `remediated`, etc.)
119
+ 6. `patch_status = deployed` → 100% `remediated`; four other values → 99% `in_remediation`
120
+ 7. `risk_score_composite` is computed from flag fields (indirect oracle)
121
+ 8. `patch_lag_days` is suspected to have similar sentinel structure (precaution)
122
+
123
+ **6 README-suggested headline targets unlearnable after honest leak removal:**
124
+ - `exploit_maturity_final` 4-class (acc 0.31 vs majority 0.36)
125
+ - `exploitation_occurred_flag` binary (acc 0.86 vs majority 0.92)
126
+ - `zero_day_flag` binary (acc 0.95 vs majority 0.97)
127
+ - `cisa_kev_flag` binary (only 14 positives in sample)
128
+ - `supply_chain_propagation_flag` binary (only 20 positives)
129
+ - `false_positive_flag` binary (acc 0.87 vs majority 0.92)
130
+
131
+ **Only viable headline target:** `vulnerability_class` 8-class — acc
132
+ 0.244, ROC-AUC 0.687 vs majority 0.176. The catalog's weakest baseline,
133
+ shipped as a reference and as proof that vulnerability_class is the
134
+ only README-suggested target that learns honestly on the sample.
135
+
136
  ## Calibrated Benchmark Targets
137
 
138
  The full product is calibrated to 12 benchmark validation tests drawn from
 
215
 
216
  ## Suggested Use Cases
217
 
218
+ - Training **vulnerability classification** models (the baseline ships this) —
219
+ [worked example available](https://huggingface.co/xpertsystems/cyb009-baseline-classifier)
220
  - Training **vulnerability triage** models — predict CVSS/EPSS-prioritized
221
  remediation order
222
  - **Zero-day prediction** — feature engineering from pre-disclosure
223
+ telemetry (see leakage diagnostic — unlearnable on the sample)
224
+ - **CISA KEV listing prediction** — early-warning for emergency patching (see leakage diagnostic — too few positives in the sample)
225
+ - **Supply chain compromise detection** — SBOM signal modeling (see leakage diagnostic — too few positives in the sample)
226
  - **Patch deployment ETA forecasting** — per-class patch development
227
  duration prediction
228
+ - **SLA breach prediction** — early-warning for at-risk vulnerabilities (see leakage diagnostic — unlearnable on the sample)
229
  - **Asset criticality classification** from inventory features
230
+ - **EPSS calibration validation** — empirical vs predicted exploitation (see leakage diagnostic — exploit_maturity_final structurally encoded)
231
  - **Compensating control effectiveness** modeling
232
  - **Risk acceptance decision** modeling — predict which vulns get
233
  accepted vs remediated
234
+ - **Lifecycle phase transition prediction** — multi-class sequence modeling (see leakage diagnostic — state-machine determinism)
235
 
236
  ## Loading the Data
237
 
 
248
  suffixes=("", "_summary"))
249
  enriched = enriched.merge(assets, on="asset_id", how="left")
250
 
251
+ # 8-class vulnerability classification target (the baseline ships this)
252
+ y_class = vulns["vulnerability_class"]
253
 
254
+ # Binary exploitation-in-wild target (see leakage diagnostic — unlearnable on sample)
255
+ y_exploited = vulns["exploitation_occurred_flag"]
256
 
257
+ # Binary CISA KEV listing target (rare event — only 14 positives in sample)
258
+ y_kev = vulns["cisa_kev_flag"]
259
 
260
+ # Binary SLA breach prediction (see leakage diagnostic — unlearnable)
261
+ y_sla = records["sla_compliance_flag"] # Note: data uses compliance flag (True=compliant), not breach flag
262
  ```
263
 
264
+ For a worked end-to-end example with vulnerability_class 8-class
265
+ classification, stratified splitting, feature engineering, and the
266
+ full 8-oracle-path leakage audit, see the
267
+ [baseline classifier repo](https://huggingface.co/xpertsystems/cyb009-baseline-classifier).
268
+
269
  ## License
270
 
271
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial