Update README.md
Browse files
README.md
CHANGED
|
@@ -28,6 +28,18 @@ Trajectory Dataset** product. It contains roughly **~4% of the full dataset**
|
|
| 28 |
at identical schema, attacker-tier distribution, and statistical fingerprint,
|
| 29 |
so you can evaluate fit before licensing the full product.
|
| 30 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 31 |
| File | Rows (sample) | Rows (full) | Description |
|
| 32 |
|-------------------------------|---------------|---------------|----------------------------------------------|
|
| 33 |
| `network_topology.csv` | ~200 | ~2,800 | Network segment / defender registry |
|
|
@@ -39,7 +51,7 @@ so you can evaluate fit before licensing the full product.
|
|
| 39 |
|
| 40 |
CYB011 simulates end-to-end **adversarial AI evasion attack campaigns**
|
| 41 |
against ML-based security detection systems, modeled as a **6-phase
|
| 42 |
-
adversarial state machine**:
|
| 43 |
|
| 44 |
- **6 adversarial phases**: reconnaissance → feature_space_probe →
|
| 45 |
perturbation_craft → evasion_attempt → feedback_adaptation →
|
|
@@ -65,6 +77,58 @@ adversarial state machine**:
|
|
| 65 |
- **MLOps security signals** — gradient access patterns, feature-space
|
| 66 |
probing, lateral pivoting between models
|
| 67 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 68 |
## Calibrated Benchmark Targets
|
| 69 |
|
| 70 |
The full product is calibrated to 12 benchmark validation tests drawn from
|
|
@@ -146,10 +210,16 @@ log and segment/defender registry schemas respectively.
|
|
| 146 |
|
| 147 |
- Training **adversarial example detectors** — distinguish clean vs
|
| 148 |
perturbed inputs from feature-space telemetry
|
|
|
|
|
|
|
|
|
|
| 149 |
- **Attacker tier attribution** — 4-class classification of evasion
|
| 150 |
-
campaigns by capability tier
|
|
|
|
|
|
|
| 151 |
- **Defender architecture vulnerability assessment** — predict which
|
| 152 |
-
defender architectures are most evadable
|
|
|
|
| 153 |
- **L∞ / L2 perturbation budget detection** — calibrate ε-thresholds
|
| 154 |
- **Query budget exhaustion attacks** — model black-box query patterns
|
| 155 |
- **Concept drift poisoning detection** — distinguish natural drift
|
|
@@ -173,24 +243,29 @@ summaries = pd.read_csv("campaign_summary.csv")
|
|
| 173 |
events = pd.read_csv("campaign_events.csv")
|
| 174 |
topology = pd.read_csv("network_topology.csv")
|
| 175 |
|
| 176 |
-
# Join trajectory data with
|
| 177 |
-
enriched = trajectories.merge(
|
| 178 |
-
|
| 179 |
-
enriched = enriched.merge(topology, on="segment_id", how="left")
|
| 180 |
|
| 181 |
-
#
|
| 182 |
-
|
| 183 |
|
| 184 |
-
#
|
| 185 |
-
|
| 186 |
|
| 187 |
-
#
|
| 188 |
-
|
| 189 |
|
| 190 |
-
#
|
| 191 |
-
|
|
|
|
| 192 |
```
|
| 193 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 194 |
## License
|
| 195 |
|
| 196 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|
|
|
|
| 28 |
at identical schema, attacker-tier distribution, and statistical fingerprint,
|
| 29 |
so you can evaluate fit before licensing the full product.
|
| 30 |
|
| 31 |
+
> 🤖 **Trained baseline + leakage diagnostic available:**
|
| 32 |
+
> [**xpertsystems/cyb011-baseline-classifier**](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
|
| 33 |
+
> — XGBoost + PyTorch MLP for **7-class adversarial attack phase
|
| 34 |
+
> classification** (the dataset's headline target), group-aware split
|
| 35 |
+
> by `campaign_id`, multi-seed evaluation (acc 0.867 ± 0.010, ROC-AUC
|
| 36 |
+
> 0.977 ± 0.002). **Includes a comprehensive `leakage_diagnostic.json`**
|
| 37 |
+
> documenting 6 oracle paths discovered across the dataset's targets,
|
| 38 |
+
> 4 README-suggested headline targets that are unlearnable on the
|
| 39 |
+
> sample after honest leak removal, and the missing `nation_state`
|
| 40 |
+
> attacker tier. Buyers planning adversarial ML research should read
|
| 41 |
+
> the diagnostic first.
|
| 42 |
+
|
| 43 |
| File | Rows (sample) | Rows (full) | Description |
|
| 44 |
|-------------------------------|---------------|---------------|----------------------------------------------|
|
| 45 |
| `network_topology.csv` | ~200 | ~2,800 | Network segment / defender registry |
|
|
|
|
| 51 |
|
| 52 |
CYB011 simulates end-to-end **adversarial AI evasion attack campaigns**
|
| 53 |
against ML-based security detection systems, modeled as a **6-phase
|
| 54 |
+
adversarial state machine** (data has 7 phases — adds `idle_dwell`):
|
| 55 |
|
| 56 |
- **6 adversarial phases**: reconnaissance → feature_space_probe →
|
| 57 |
perturbation_craft → evasion_attempt → feedback_adaptation →
|
|
|
|
| 77 |
- **MLOps security signals** — gradient access patterns, feature-space
|
| 78 |
probing, lateral pivoting between models
|
| 79 |
|
| 80 |
+
## Trained Baseline + Leakage Audit Available
|
| 81 |
+
|
| 82 |
+
A working baseline classifier + comprehensive leakage diagnostic is
|
| 83 |
+
published at
|
| 84 |
+
**[xpertsystems/cyb011-baseline-classifier](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)**.
|
| 85 |
+
|
| 86 |
+
| Component | Detail |
|
| 87 |
+
|---|---|
|
| 88 |
+
| Primary task | **7-class `attack_phase` classification** (the dataset's headline target) |
|
| 89 |
+
| Secondary artifact | **`leakage_diagnostic.json`** — 6 oracle paths + 4 unlearnable targets + missing tier note |
|
| 90 |
+
| Models | XGBoost (`model_xgb.json`) + PyTorch MLP (`model_mlp.safetensors`) |
|
| 91 |
+
| Features | 37 (after one-hot encoding); pipeline included as `feature_engineering.py` |
|
| 92 |
+
| Split | **Group-aware** (GroupShuffleSplit on `campaign_id`) — 200 campaigns, ~30 in test fold |
|
| 93 |
+
| Validation | Single seed + multi-seed aggregate across 10 seeds |
|
| 94 |
+
| Demo | `inference_example.ipynb` — end-to-end copy-paste |
|
| 95 |
+
| Headline metrics | XGBoost: accuracy 0.867 ± 0.010, macro ROC-AUC 0.977 ± 0.002 (multi-seed) |
|
| 96 |
+
|
| 97 |
+
**Important findings for buyers planning CYB011 ML work** (full detail
|
| 98 |
+
in
|
| 99 |
+
[`leakage_diagnostic.json`](https://huggingface.co/xpertsystems/cyb011-baseline-classifier/blob/main/leakage_diagnostic.json)):
|
| 100 |
+
|
| 101 |
+
**Missing `nation_state` attacker tier:** README lists 4 tiers; sample
|
| 102 |
+
contains only 3 (script_kiddie 50%, opportunistic 40%, APT 10%).
|
| 103 |
+
Nation_state events are entirely absent. Models trained on this
|
| 104 |
+
sample cannot generalize to nation_state actors.
|
| 105 |
+
|
| 106 |
+
**6 oracle paths documented** across the dataset's targets:
|
| 107 |
+
|
| 108 |
+
**Phase target oracles (3 paths — must be dropped):**
|
| 109 |
+
1. `detection_outcome` (`!= suppressed_alert` → 100% `evasion_attempt`)
|
| 110 |
+
2. `detector_confidence_score` (threshold-derived from `detection_outcome`)
|
| 111 |
+
3. `evasion_budget_consumed` (`== 0` → 100% one of 3 early phases)
|
| 112 |
+
|
| 113 |
+
**Other documented leaks (for transparency):**
|
| 114 |
+
4. `stealth_score` near-deterministic per `attacker_capability_tier` (inflates per-campaign tier prediction from honest ~0.50 to 0.94)
|
| 115 |
+
5. Topology fingerprint — 7 segment-level features uniquely identify each `defender_architecture` (makes 8-class defender prediction trivially 100%, collapses to 0.13 when fingerprint dropped)
|
| 116 |
+
6. `timestep` partial oracle for 3 phases — **KEPT in the published model as legitimate campaign-progress observable**
|
| 117 |
+
|
| 118 |
+
**7 phases in data, README claims 6:** The data adds `idle_dwell` as
|
| 119 |
+
a phase (17.5% of events). The published baseline trains on all 7.
|
| 120 |
+
|
| 121 |
+
**4 README-suggested headline targets unlearnable after honest leak
|
| 122 |
+
removal:**
|
| 123 |
+
- `campaign_success_flag` binary (acc 0.51 vs majority 0.61)
|
| 124 |
+
- `campaign_type` 8-class (acc 0.11 vs majority 0.17)
|
| 125 |
+
- `coordinated_attack_flag` binary (acc 0.83 vs majority 0.90, only 20 positives)
|
| 126 |
+
- `defender_architecture` 8-class (collapses when topology fingerprint dropped)
|
| 127 |
+
|
| 128 |
+
**Only viable headline target:** `attack_phase` 7-class — acc 0.867,
|
| 129 |
+
ROC-AUC 0.977 with group-aware split. All 7 classes earn nonzero F1
|
| 130 |
+
(range 0.49-1.00).
|
| 131 |
+
|
| 132 |
## Calibrated Benchmark Targets
|
| 133 |
|
| 134 |
The full product is calibrated to 12 benchmark validation tests drawn from
|
|
|
|
| 210 |
|
| 211 |
- Training **adversarial example detectors** — distinguish clean vs
|
| 212 |
perturbed inputs from feature-space telemetry
|
| 213 |
+
- **Attack phase classification** (the baseline ships this) — predict
|
| 214 |
+
the 7-phase position of a trajectory event —
|
| 215 |
+
[worked example available](https://huggingface.co/xpertsystems/cyb011-baseline-classifier)
|
| 216 |
- **Attacker tier attribution** — 4-class classification of evasion
|
| 217 |
+
campaigns by capability tier (see leakage diagnostic — nation_state
|
| 218 |
+
tier MISSING from sample; per-campaign prediction inflated by
|
| 219 |
+
stealth_score leakage)
|
| 220 |
- **Defender architecture vulnerability assessment** — predict which
|
| 221 |
+
defender architectures are most evadable (see leakage diagnostic —
|
| 222 |
+
trivially leaky via topology fingerprint; unlearnable when dropped)
|
| 223 |
- **L∞ / L2 perturbation budget detection** — calibrate ε-thresholds
|
| 224 |
- **Query budget exhaustion attacks** — model black-box query patterns
|
| 225 |
- **Concept drift poisoning detection** — distinguish natural drift
|
|
|
|
| 243 |
events = pd.read_csv("campaign_events.csv")
|
| 244 |
topology = pd.read_csv("network_topology.csv")
|
| 245 |
|
| 246 |
+
# Join trajectory data with topology (segment-level features)
|
| 247 |
+
enriched = trajectories.merge(topology, left_on="target_segment_id",
|
| 248 |
+
right_on="segment_id", how="left")
|
|
|
|
| 249 |
|
| 250 |
+
# 7-class attack_phase target (the baseline ships this)
|
| 251 |
+
y_phase = trajectories["attack_phase"]
|
| 252 |
|
| 253 |
+
# Multi-class attacker tier (3 values in sample; see leakage diagnostic)
|
| 254 |
+
y_tier = trajectories["attacker_capability_tier"]
|
| 255 |
|
| 256 |
+
# Binary evasion success target (see leakage diagnostic — unlearnable)
|
| 257 |
+
y_evasion = summaries["campaign_success_flag"]
|
| 258 |
|
| 259 |
+
# Multi-class defender architecture target (see leakage diagnostic —
|
| 260 |
+
# trivially leaky via topology fingerprint)
|
| 261 |
+
y_defender = topology["defender_architecture"]
|
| 262 |
```
|
| 263 |
|
| 264 |
+
For a worked end-to-end example with `attack_phase` 7-class
|
| 265 |
+
classification, group-aware splitting, feature engineering, and the
|
| 266 |
+
full 6-oracle-path leakage audit, see the
|
| 267 |
+
[baseline classifier repo](https://huggingface.co/xpertsystems/cyb011-baseline-classifier).
|
| 268 |
+
|
| 269 |
## License
|
| 270 |
|
| 271 |
This **sample** is released under **CC-BY-NC-4.0** (free for non-commercial
|