Update README.md
Browse files
README.md
CHANGED
|
@@ -28,6 +28,18 @@ Log Dataset** product. It contains roughly **~10% of the full dataset** at
|
|
| 28 |
identical schema, MITRE ATT&CK technique coverage, and statistical
|
| 29 |
fingerprint, so you can evaluate fit before licensing the full product.
|
| 30 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 31 |
| File | Rows (sample) | Rows (full) | Description |
|
| 32 |
|----------------------------|---------------|---------------|----------------------------------------------|
|
| 33 |
| `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
|
|
@@ -60,6 +72,60 @@ lifecycle state machine** across realistic detection environments, with:
|
|
| 60 |
- **IOC seeding density** — calibrated indicator-of-compromise injection
|
| 61 |
for threat intel detection benchmarking
|
| 62 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 63 |
## Calibrated Benchmark Targets
|
| 64 |
|
| 65 |
The full product is calibrated to 6 benchmark validation tests drawn from
|
|
@@ -143,9 +209,16 @@ Sample benchmark results:
|
|
| 143 |
|
| 144 |
## Suggested Use Cases
|
| 145 |
|
| 146 |
-
- Training **
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 147 |
- **MITRE ATT&CK technique classification** from raw log lines
|
| 148 |
- **Threat actor attribution** — 5-class with realistic class imbalance
|
|
|
|
|
|
|
| 149 |
- **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
|
| 150 |
- **Dwell time forecasting** under varying defender posture
|
| 151 |
- **Lateral movement detection** from event sequences
|
|
@@ -169,21 +242,31 @@ enriched = events.merge(hosts, on="host_id", how="left",
|
|
| 169 |
suffixes=("", "_host"))
|
| 170 |
|
| 171 |
# Join alerts back to source event and incident
|
| 172 |
-
alerts_full = alerts.merge(events, left_on="
|
| 173 |
right_on="event_id", how="left",
|
| 174 |
suffixes=("_alert", "_event"))
|
| 175 |
|
| 176 |
-
#
|
|
|
|
|
|
|
|
|
|
|
|
|
| 177 |
y_actor = events["threat_actor_profile"]
|
| 178 |
|
| 179 |
# Binary false-positive prediction target
|
|
|
|
| 180 |
y_fp = alerts["label_false_positive"]
|
| 181 |
|
| 182 |
# Multi-class MITRE technique target (filter to malicious events)
|
| 183 |
-
malicious = events[events["
|
| 184 |
y_technique = malicious["mitre_technique_id"]
|
| 185 |
```
|
| 186 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 187 |
## License
|
| 188 |
|
| 189 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|
|
|
|
| 28 |
identical schema, MITRE ATT&CK technique coverage, and statistical
|
| 29 |
fingerprint, so you can evaluate fit before licensing the full product.
|
| 30 |
|
| 31 |
+
> 🤖 **Trained baseline + leakage diagnostic available:**
|
| 32 |
+
> [**xpertsystems/cyb010-baseline-classifier**](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
|
| 33 |
+
> — XGBoost + PyTorch MLP for **5-class attack lifecycle phase
|
| 34 |
+
> classification** (the dataset's headline target), group-aware split
|
| 35 |
+
> by `incident_id`, multi-seed evaluation (acc 0.936 ± 0.007, ROC-AUC
|
| 36 |
+
> 0.988 ± 0.001 — tightest AUC std in the catalog). **Includes a
|
| 37 |
+
> comprehensive `leakage_diagnostic.json`** documenting 11 oracle
|
| 38 |
+
> paths discovered across the dataset's targets and 2 README-suggested
|
| 39 |
+
> headline targets that are unlearnable on the sample after honest
|
| 40 |
+
> leak removal. Buyers planning SIEM ML work should read the
|
| 41 |
+
> diagnostic first.
|
| 42 |
+
|
| 43 |
| File | Rows (sample) | Rows (full) | Description |
|
| 44 |
|----------------------------|---------------|---------------|----------------------------------------------|
|
| 45 |
| `host_inventory.csv` | ~400 | ~3,200 | Enterprise host inventory |
|
|
|
|
| 72 |
- **IOC seeding density** — calibrated indicator-of-compromise injection
|
| 73 |
for threat intel detection benchmarking
|
| 74 |
|
| 75 |
+
## Trained Baseline + Leakage Audit Available
|
| 76 |
+
|
| 77 |
+
A working baseline classifier + comprehensive leakage diagnostic is
|
| 78 |
+
published at
|
| 79 |
+
**[xpertsystems/cyb010-baseline-classifier](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)**.
|
| 80 |
+
|
| 81 |
+
| Component | Detail |
|
| 82 |
+
|---|---|
|
| 83 |
+
| Primary task | **5-class `attack_lifecycle_phase` classification** (the dataset's headline target) |
|
| 84 |
+
| Secondary artifact | **`leakage_diagnostic.json`** — 11 oracle paths + 2 unlearnable targets |
|
| 85 |
+
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
|
| 86 |
+
| Features | 87 (after one-hot encoding); pipeline included as `feature_engineering.py` |
|
| 87 |
+
| Split | **Group-aware** (GroupShuffleSplit on `incident_id`) — 500 incidents, ~75 in test fold |
|
| 88 |
+
| Validation | Single seed + multi-seed aggregate across 10 seeds |
|
| 89 |
+
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
|
| 90 |
+
| Headline metrics | XGBoost: accuracy 0.936 ± 0.007, macro ROC-AUC 0.988 ± 0.001 (multi-seed) |
|
| 91 |
+
|
| 92 |
+
**Important findings for buyers planning CYB010 ML work** (full detail
|
| 93 |
+
in
|
| 94 |
+
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb010-baseline-classifier/blob/main/leakage_diagnostic.json)):
|
| 95 |
+
|
| 96 |
+
**11 oracle paths documented across two task families:**
|
| 97 |
+
|
| 98 |
+
**Phase target oracles (6 paths)** — drop these when training your own
|
| 99 |
+
phase classifier:
|
| 100 |
+
|
| 101 |
+
1. `mitre_tactic == "benign"` → 100% `benign_background` phase
|
| 102 |
+
2. `mitre_technique_id` → `mitre_tactic` (perfect ATT&CK-by-design oracle)
|
| 103 |
+
3. `label_malicious == False` → 100% `benign_background`
|
| 104 |
+
4. `threat_actor_id == "NONE"` → 100% benign
|
| 105 |
+
5. `threat_actor_profile == "benign_user"` → 100% benign
|
| 106 |
+
6. `event_type` (many values phase-specific; e.g. `c2_beacon_outbound` → 100% exfil)
|
| 107 |
+
|
| 108 |
+
**Alert TP target oracles (7 paths)** — `label_true_positive` on
|
| 109 |
+
`alert_records.csv` is 100% accurate with any single one of these
|
| 110 |
+
intact:
|
| 111 |
+
|
| 112 |
+
1. `alert_category == "false_positive_noise"` → 100% FP
|
| 113 |
+
2. `label_false_positive` (mirror target)
|
| 114 |
+
3. `time_to_detect_seconds == 0` → 100% FP (sentinel)
|
| 115 |
+
4. `correlated_chain_length == 1` → near-100% FP (sentinel)
|
| 116 |
+
5. `analyst_triage_priority ∈ {P1,P2,P3}` → 100% TP
|
| 117 |
+
6. `suppression_reason == NaN` → 100% TP
|
| 118 |
+
7. `alert_rule_name` (rule names encode answer)
|
| 119 |
+
|
| 120 |
+
**2 README-suggested headline targets unlearnable after honest leak
|
| 121 |
+
removal:**
|
| 122 |
+
- `threat_actor_profile` 4-class malicious-only (acc 0.55 vs majority 0.61)
|
| 123 |
+
- `event_class` 12-class (acc 0.35 vs majority 0.42)
|
| 124 |
+
|
| 125 |
+
**Viable secondary task:** `label_true_positive` binary on alerts —
|
| 126 |
+
acc 0.80, AUC 0.89 after dropping all 7 oracle columns. Documented in
|
| 127 |
+
the diagnostic.
|
| 128 |
+
|
| 129 |
## Calibrated Benchmark Targets
|
| 130 |
|
| 131 |
The full product is calibrated to 6 benchmark validation tests drawn from
|
|
|
|
| 209 |
|
| 210 |
## Suggested Use Cases
|
| 211 |
|
| 212 |
+
- Training **attack lifecycle phase classification** models (the
|
| 213 |
+
baseline ships this) —
|
| 214 |
+
[worked example available](https://huggingface.co/xpertsystems/cyb010-baseline-classifier)
|
| 215 |
+
- Training **SIEM alert triage** models — predict true_positive vs
|
| 216 |
+
false_positive (see leakage diagnostic — 7 oracle columns must be
|
| 217 |
+
dropped; honest acc 0.80 / AUC 0.89)
|
| 218 |
- **MITRE ATT&CK technique classification** from raw log lines
|
| 219 |
- **Threat actor attribution** — 5-class with realistic class imbalance
|
| 220 |
+
(see leakage diagnostic — 4-class malicious-only is unlearnable;
|
| 221 |
+
5-class works only because benign separation is trivial)
|
| 222 |
- **Multi-format log parser training** — 8 SIEM vendor formats in one corpus
|
| 223 |
- **Dwell time forecasting** under varying defender posture
|
| 224 |
- **Lateral movement detection** from event sequences
|
|
|
|
| 242 |
suffixes=("", "_host"))
|
| 243 |
|
| 244 |
# Join alerts back to source event and incident
|
| 245 |
+
alerts_full = alerts.merge(events, left_on="correlated_event_ids",
|
| 246 |
right_on="event_id", how="left",
|
| 247 |
suffixes=("_alert", "_event"))
|
| 248 |
|
| 249 |
+
# 5-class attack lifecycle phase target (the baseline ships this)
|
| 250 |
+
y_phase = events["attack_lifecycle_phase"]
|
| 251 |
+
|
| 252 |
+
# Multi-class threat actor profile target (5-class with benign;
|
| 253 |
+
# see leakage diagnostic — 4-class malicious-only is unlearnable)
|
| 254 |
y_actor = events["threat_actor_profile"]
|
| 255 |
|
| 256 |
# Binary false-positive prediction target
|
| 257 |
+
# (see leakage diagnostic — 7 oracle columns must be dropped)
|
| 258 |
y_fp = alerts["label_false_positive"]
|
| 259 |
|
| 260 |
# Multi-class MITRE technique target (filter to malicious events)
|
| 261 |
+
malicious = events[events["label_malicious"] == True]
|
| 262 |
y_technique = malicious["mitre_technique_id"]
|
| 263 |
```
|
| 264 |
|
| 265 |
+
For a worked end-to-end example with `attack_lifecycle_phase` 5-class
|
| 266 |
+
classification, group-aware splitting, feature engineering, and the
|
| 267 |
+
full 11-oracle-path leakage audit, see the
|
| 268 |
+
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb010-baseline-classifier).
|
| 269 |
+
|
| 270 |
## License
|
| 271 |
|
| 272 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|