pradeep-xpert commited on
Commit
f8be070
·
verified ·
1 Parent(s): ff8b83d

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +90 -15
README.md CHANGED
@@ -28,6 +28,18 @@ Trajectory Dataset** product. It contains roughly **~4% of the full dataset**
28
  at identical schema, attacker-tier distribution, and statistical fingerprint,
29
  so you can evaluate fit before licensing the full product.
30
 
 
 
 
 
 
 
 
 
 
 
 
 
31
  | File | Rows (sample) | Rows (full) | Description |
32
  |-------------------------------|---------------|---------------|----------------------------------------------|
33
  | `network_topology.csv` | ~200 | ~2,800 | Network segment / defender registry |
@@ -39,7 +51,7 @@ so you can evaluate fit before licensing the full product.
39
 
40
  CYB011 simulates end-to-end **adversarial AI evasion attack campaigns**
41
  against ML-based security detection systems, modeled as a **6-phase
42
- adversarial state machine**:
43
 
44
  - **6 adversarial phases**: reconnaissance → feature_space_probe →
45
  perturbation_craft → evasion_attempt → feedback_adaptation →
@@ -65,6 +77,58 @@ adversarial state machine**:
65
  - **MLOps security signals** — gradient access patterns, feature-space
66
  probing, lateral pivoting between models
67
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
68
  ## Calibrated Benchmark Targets
69
 
70
  The full product is calibrated to 12 benchmark validation tests drawn from
@@ -146,10 +210,16 @@ log and segment/defender registry schemas respectively.
146
 
147
  - Training **adversarial example detectors** — distinguish clean vs
148
  perturbed inputs from feature-space telemetry
 
 
 
149
  - **Attacker tier attribution** — 4-class classification of evasion
150
- campaigns by capability tier
 
 
151
  - **Defender architecture vulnerability assessment** — predict which
152
- defender architectures are most evadable
 
153
  - **L∞ / L2 perturbation budget detection** — calibrate ε-thresholds
154
  - **Query budget exhaustion attacks** — model black-box query patterns
155
  - **Concept drift poisoning detection** — distinguish natural drift
@@ -173,24 +243,29 @@ summaries = pd.read_csv("campaign_summary.csv")
173
  events = pd.read_csv("campaign_events.csv")
174
  topology = pd.read_csv("network_topology.csv")
175
 
176
- # Join trajectory data with campaign-level labels
177
- enriched = trajectories.merge(summaries, on=["campaign_id", "attacker_id"],
178
- how="left", suffixes=("", "_summary"))
179
- enriched = enriched.merge(topology, on="segment_id", how="left")
180
 
181
- # 4-class attacker tier target
182
- y_tier = summaries["attacker_tier"]
183
 
184
- # Binary evasion success target
185
- y_evasion = summaries["evasion_success_flag"]
186
 
187
- # Multi-class defender architecture target
188
- y_defender = topology["defender_architecture"]
189
 
190
- # Binary concept drift / poisoning detection
191
- y_poisoned = summaries["concept_drift_injected_flag"]
 
192
  ```
193
 
 
 
 
 
 
194
  ## License
195
 
196
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
 
28
  at identical schema, attacker-tier distribution, and statistical fingerprint,
29
  so you can evaluate fit before licensing the full product.
30
 
31
+ > 🤖 **Trained baseline + leakage diagnostic available:**
32
+ > [**xpertsystems/cyb011-baseline-classifier**](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
33
+ > — XGBoost + PyTorch MLP for **7-class adversarial attack phase
34
+ > classification** (the dataset's headline target), group-aware split
35
+ > by `campaign_id`, multi-seed evaluation (acc 0.867 ± 0.010, ROC-AUC
36
+ > 0.977 ± 0.002). **Includes a comprehensive `leakage_diagnostic.json`**
37
+ > documenting 6 oracle paths discovered across the dataset's targets,
38
+ > 4 README-suggested headline targets that are unlearnable on the
39
+ > sample after honest leak removal, and the missing `nation_state`
40
+ > attacker tier. Buyers planning adversarial ML research should read
41
+ > the diagnostic first.
42
+
43
  | File | Rows (sample) | Rows (full) | Description |
44
  |-------------------------------|---------------|---------------|----------------------------------------------|
45
  | `network_topology.csv` | ~200 | ~2,800 | Network segment / defender registry |
 
51
 
52
  CYB011 simulates end-to-end **adversarial AI evasion attack campaigns**
53
  against ML-based security detection systems, modeled as a **6-phase
54
+ adversarial state machine** (data has 7 phases — adds `idle_dwell`):
55
 
56
  - **6 adversarial phases**: reconnaissance → feature_space_probe →
57
  perturbation_craft → evasion_attempt → feedback_adaptation →
 
77
  - **MLOps security signals** — gradient access patterns, feature-space
78
  probing, lateral pivoting between models
79
 
80
+ ## Trained Baseline + Leakage Audit Available
81
+
82
+ A working baseline classifier + comprehensive leakage diagnostic is
83
+ published at
84
+ **[xpertsystems/cyb011-baseline-classifier](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)**.
85
+
86
+ | Component | Detail |
87
+ |---|---|
88
+ | Primary task | **7-class `attack_phase` classification** (the dataset's headline target) |
89
+ | Secondary artifact | **`leakage_diagnostic.json`** — 6 oracle paths + 4 unlearnable targets + missing tier note |
90
+ | Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
91
+ | Features | 37 (after one-hot encoding); pipeline included as `feature_engineering.py` |
92
+ | Split | **Group-aware** (GroupShuffleSplit on `campaign_id`) — 200 campaigns, ~30 in test fold |
93
+ | Validation | Single seed + multi-seed aggregate across 10 seeds |
94
+ | Demo | `inference_example.ipynb` — end-to-end copy-paste |
95
+ | Headline metrics | XGBoost: accuracy 0.867 ± 0.010, macro ROC-AUC 0.977 ± 0.002 (multi-seed) |
96
+
97
+ **Important findings for buyers planning CYB011 ML work** (full detail
98
+ in
99
+ [`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb011-baseline-classifier/blob/main/leakage_diagnostic.json)):
100
+
101
+ **Missing `nation_state` attacker tier:** README lists 4 tiers; sample
102
+ contains only 3 (script_kiddie 50%, opportunistic 40%, APT 10%).
103
+ Nation_state events are entirely absent. Models trained on this
104
+ sample cannot generalize to nation_state actors.
105
+
106
+ **6 oracle paths documented** across the dataset's targets:
107
+
108
+ **Phase target oracles (3 paths — must be dropped):**
109
+ 1. `detection_outcome` (`!= suppressed_alert` → 100% `evasion_attempt`)
110
+ 2. `detector_confidence_score` (threshold-derived from `detection_outcome`)
111
+ 3. `evasion_budget_consumed` (`== 0` → 100% one of 3 early phases)
112
+
113
+ **Other documented leaks (for transparency):**
114
+ 4. `stealth_score` near-deterministic per `attacker_capability_tier` (inflates per-campaign tier prediction from honest ~0.50 to 0.94)
115
+ 5. Topology fingerprint — 7 segment-level features uniquely identify each `defender_architecture` (makes 8-class defender prediction trivially 100%, collapses to 0.13 when fingerprint dropped)
116
+ 6. `timestep` partial oracle for 3 phases — **KEPT in the published model as legitimate campaign-progress observable**
117
+
118
+ **7 phases in data, README claims 6:** The data adds `idle_dwell` as
119
+ a phase (17.5% of events). The published baseline trains on all 7.
120
+
121
+ **4 README-suggested headline targets unlearnable after honest leak
122
+ removal:**
123
+ - `campaign_success_flag` binary (acc 0.51 vs majority 0.61)
124
+ - `campaign_type` 8-class (acc 0.11 vs majority 0.17)
125
+ - `coordinated_attack_flag` binary (acc 0.83 vs majority 0.90, only 20 positives)
126
+ - `defender_architecture` 8-class (collapses when topology fingerprint dropped)
127
+
128
+ **Only viable headline target:** `attack_phase` 7-class — acc 0.867,
129
+ ROC-AUC 0.977 with group-aware split. All 7 classes earn nonzero F1
130
+ (range 0.49-1.00).
131
+
132
  ## Calibrated Benchmark Targets
133
 
134
  The full product is calibrated to 12 benchmark validation tests drawn from
 
210
 
211
  - Training **adversarial example detectors** — distinguish clean vs
212
  perturbed inputs from feature-space telemetry
213
+ - **Attack phase classification** (the baseline ships this) — predict
214
+ the 7-phase position of a trajectory event —
215
+ [worked example available](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
216
  - **Attacker tier attribution** — 4-class classification of evasion
217
+ campaigns by capability tier (see leakage diagnostic — nation_state
218
+ tier MISSING from sample; per-campaign prediction inflated by
219
+ stealth_score leakage)
220
  - **Defender architecture vulnerability assessment** — predict which
221
+ defender architectures are most evadable (see leakage diagnostic —
222
+ trivially leaky via topology fingerprint; unlearnable when dropped)
223
  - **L∞ / L2 perturbation budget detection** — calibrate ε-thresholds
224
  - **Query budget exhaustion attacks** — model black-box query patterns
225
  - **Concept drift poisoning detection** — distinguish natural drift
 
243
  events = pd.read_csv("campaign_events.csv")
244
  topology = pd.read_csv("network_topology.csv")
245
 
246
+ # Join trajectory data with topology (segment-level features)
247
+ enriched = trajectories.merge(topology, left_on="target_segment_id",
248
+ right_on="segment_id", how="left")
 
249
 
250
+ # 7-class attack_phase target (the baseline ships this)
251
+ y_phase = trajectories["attack_phase"]
252
 
253
+ # Multi-class attacker tier (3 values in sample; see leakage diagnostic)
254
+ y_tier = trajectories["attacker_capability_tier"]
255
 
256
+ # Binary evasion success target (see leakage diagnostic — unlearnable)
257
+ y_evasion = summaries["campaign_success_flag"]
258
 
259
+ # Multi-class defender architecture target (see leakage diagnostic —
260
+ # trivially leaky via topology fingerprint)
261
+ y_defender = topology["defender_architecture"]
262
  ```
263
 
264
+ For a worked end-to-end example with `attack_phase` 7-class
265
+ classification, group-aware splitting, feature engineering, and the
266
+ full 6-oracle-path leakage audit, see the
267
+ [baseline classifier repo](https://huggingface.co/xpertsystems/cyb011-baseline-classifier).
268
+
269
  ## License
270
 
271
  This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial