pradeep-xpert commited on
Commit
752e119
·
verified ·
1 Parent(s): 1a74c11

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +87 -4
README.md CHANGED
@@ -28,6 +28,18 @@ Log Dataset** product. It contains roughly **~10% of the full dataset** at
28
  identical schema, MITRE ATT&CK technique coverage, and statistical
29
  fingerprint, so you can evaluate fit before licensing the full product.
30
 
 
 
 
 
 
 
 
 
 
 
 
 
31
  | File | Rows (sample) | Rows (full) | Description |
32
  |----------------------------|---------------|---------------|----------------------------------------------|
33
  | `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
@@ -60,6 +72,60 @@ lifecycle state machine** across realistic detection environments, with:
60
  - **IOC seeding density** — calibrated indicator-of-compromise injection
61
  for threat intel detection benchmarking
62
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
63
  ## Calibrated Benchmark Targets
64
 
65
  The full product is calibrated to 6 benchmark validation tests drawn from
@@ -143,9 +209,16 @@ Sample benchmark results:
143
 
144
  ## Suggested Use Cases
145
 
146
- - Training **SIEM alert triage** models — predict true_positive vs false_positive
 
 
 
 
 
147
  - **MITRE ATT&CK technique classification** from raw log lines
148
  - **Threat actor attribution** — 5-class with realistic class imbalance
 
 
149
  - **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
150
  - **Dwell time forecasting** under varying defender posture
151
  - **Lateral movement detection** from event sequences
@@ -169,21 +242,31 @@ enriched = events.merge(hosts, on="host_id", how="left",
169
  suffixes=("", "_host"))
170
 
171
  # Join alerts back to source event and incident
172
- alerts_full = alerts.merge(events, left_on="triggering_event_id",
173
  right_on="event_id", how="left",
174
  suffixes=("_alert", "_event"))
175
 
176
- # Multi-class threat actor profile target
 
 
 
 
177
  y_actor = events["threat_actor_profile"]
178
 
179
  # Binary false-positive prediction target
 
180
  y_fp = alerts["label_false_positive"]
181
 
182
  # Multi-class MITRE technique target (filter to malicious events)
183
- malicious = events[events["mitre_technique_id"] != ""]
184
  y_technique = malicious["mitre_technique_id"]
185
  ```
186
 
 
 
 
 
 
187
  ## License
188
 
189
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
 
28
  identical schema, MITRE ATT&CK technique coverage, and statistical
29
  fingerprint, so you can evaluate fit before licensing the full product.
30
 
31
+ > 🤖 **Trained baseline + leakage diagnostic available:**
32
+ > [**xpertsystems/cyb010-baseline-classifier**](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
33
+ > — XGBoost + PyTorch MLP for **5-class attack lifecycle phase
34
+ > classification** (the dataset's headline target), group-aware split
35
+ > by `incident_id`, multi-seed evaluation (acc 0.936 ± 0.007, ROC-AUC
36
+ > 0.988 ± 0.001 — tightest AUC std in the catalog). **Includes a
37
+ > comprehensive `leakage_diagnostic.json`** documenting 11 oracle
38
+ > paths discovered across the dataset's targets and 2 README-suggested
39
+ > headline targets that are unlearnable on the sample after honest
40
+ > leak removal. Buyers planning SIEM ML work should read the
41
+ > diagnostic first.
42
+
43
  | File | Rows (sample) | Rows (full) | Description |
44
  |----------------------------|---------------|---------------|----------------------------------------------|
45
  | `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
 
72
  - **IOC seeding density** — calibrated indicator-of-compromise injection
73
  for threat intel detection benchmarking
74
 
75
+ ## Trained Baseline + Leakage Audit Available
76
+
77
+ A working baseline classifier + comprehensive leakage diagnostic is
78
+ published at
79
+ **[xpertsystems/cyb010-baseline-classifier](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)**.
80
+
81
+ | Component | Detail |
82
+ |---|---|
83
+ | Primary task | **5-class `attack_lifecycle_phase` classification** (the dataset's headline target) |
84
+ | Secondary artifact | **`leakage_diagnostic.json`** — 11 oracle paths + 2 unlearnable targets |
85
+ | Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
86
+ | Features | 87 (after one-hot encoding); pipeline included as `feature_engineering.py` |
87
+ | Split | **Group-aware** (GroupShuffleSplit on `incident_id`) — 500 incidents, ~75 in test fold |
88
+ | Validation | Single seed + multi-seed aggregate across 10 seeds |
89
+ | Demo | `inference_example.ipynb` — end-to-end copy-paste |
90
+ | Headline metrics | XGBoost: accuracy 0.936 ± 0.007, macro ROC-AUC 0.988 ± 0.001 (multi-seed) |
91
+
92
+ **Important findings for buyers planning CYB010 ML work** (full detail
93
+ in
94
+ [`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb010-baseline-classifier/blob/main/leakage_diagnostic.json)):
95
+
96
+ **11 oracle paths documented across two task families:**
97
+
98
+ **Phase target oracles (6 paths)** — drop these when training your own
99
+ phase classifier:
100
+
101
+ 1. `mitre_tactic == "benign"` → 100% `benign_background` phase
102
+ 2. `mitre_technique_id` → `mitre_tactic` (perfect ATT&CK-by-design oracle)
103
+ 3. `label_malicious == False` → 100% `benign_background`
104
+ 4. `threat_actor_id == "NONE"` → 100% benign
105
+ 5. `threat_actor_profile == "benign_user"` → 100% benign
106
+ 6. `event_type` (many values phase-specific; e.g. `c2_beacon_outbound` → 100% exfil)
107
+
108
+ **Alert TP target oracles (7 paths)** — `label_true_positive` on
109
+ `alert_records.csv` is 100% accurate with any single one of these
110
+ intact:
111
+
112
+ 1. `alert_category == "false_positive_noise"` → 100% FP
113
+ 2. `label_false_positive` (mirror target)
114
+ 3. `time_to_detect_seconds == 0` → 100% FP (sentinel)
115
+ 4. `correlated_chain_length == 1` → near-100% FP (sentinel)
116
+ 5. `analyst_triage_priority ∈ {P1,P2,P3}` → 100% TP
117
+ 6. `suppression_reason == NaN` → 100% TP
118
+ 7. `alert_rule_name` (rule names encode answer)
119
+
120
+ **2 README-suggested headline targets unlearnable after honest leak
121
+ removal:**
122
+ - `threat_actor_profile` 4-class malicious-only (acc 0.55 vs majority 0.61)
123
+ - `event_class` 12-class (acc 0.35 vs majority 0.42)
124
+
125
+ **Viable secondary task:** `label_true_positive` binary on alerts —
126
+ acc 0.80, AUC 0.89 after dropping all 7 oracle columns. Documented in
127
+ the diagnostic.
128
+
129
  ## Calibrated Benchmark Targets
130
 
131
  The full product is calibrated to 6 benchmark validation tests drawn from
 
209
 
210
  ## Suggested Use Cases
211
 
212
+ - Training **attack lifecycle phase classification** models (the
213
+ baseline ships this) —
214
+ [worked example available](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
215
+ - Training **SIEM alert triage** models — predict true_positive vs
216
+ false_positive (see leakage diagnostic — 7 oracle columns must be
217
+ dropped; honest acc 0.80 / AUC 0.89)
218
  - **MITRE ATT&CK technique classification** from raw log lines
219
  - **Threat actor attribution** — 5-class with realistic class imbalance
220
+ (see leakage diagnostic — 4-class malicious-only is unlearnable;
221
+ 5-class works only because benign separation is trivial)
222
  - **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
223
  - **Dwell time forecasting** under varying defender posture
224
  - **Lateral movement detection** from event sequences
 
242
  suffixes=("", "_host"))
243
 
244
  # Join alerts back to source event and incident
245
+ alerts_full = alerts.merge(events, left_on="correlated_event_ids",
246
  right_on="event_id", how="left",
247
  suffixes=("_alert", "_event"))
248
 
249
+ # 5-class attack lifecycle phase target (the baseline ships this)
250
+ y_phase = events["attack_lifecycle_phase"]
251
+
252
+ # Multi-class threat actor profile target (5-class with benign;
253
+ # see leakage diagnostic — 4-class malicious-only is unlearnable)
254
  y_actor = events["threat_actor_profile"]
255
 
256
  # Binary false-positive prediction target
257
+ # (see leakage diagnostic — 7 oracle columns must be dropped)
258
  y_fp = alerts["label_false_positive"]
259
 
260
  # Multi-class MITRE technique target (filter to malicious events)
261
+ malicious = events[events["label_malicious"] == True]
262
  y_technique = malicious["mitre_technique_id"]
263
  ```
264
 
265
+ For a worked end-to-end example with `attack_lifecycle_phase` 5-class
266
+ classification, group-aware splitting, feature engineering, and the
267
+ full 11-oracle-path leakage audit, see the
268
+ [baseline classifier repo](https://huggingface.co/xpertsystems/cyb010-baseline-classifier).
269
+
270
  ## License
271
 
272
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial