Update README.md
Browse files
README.md
CHANGED
|
@@ -8,6 +8,8 @@ tags:
|
|
| 8 |
license: apache-2.0
|
| 9 |
language:
|
| 10 |
- en
|
|
|
|
|
|
|
| 11 |
---
|
| 12 |
|
| 13 |
# Uploaded finetuned model
|
|
@@ -19,3 +21,80 @@ language:
|
|
| 19 |
This llama model was trained 2x faster with [Unsloth](https://github.com/unslothai/unsloth) and Huggingface's TRL library.
|
| 20 |
|
| 21 |
[<img src="https://raw.githubusercontent.com/unslothai/unsloth/main/images/unsloth%20made%20with%20love.png" width="200"/>](https://github.com/unslothai/unsloth)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 8 |
license: apache-2.0
|
| 9 |
language:
|
| 10 |
- en
|
| 11 |
+
datasets:
|
| 12 |
+
- madox81/mittre_severity_ds
|
| 13 |
---
|
| 14 |
|
| 15 |
# Uploaded finetuned model
|
|
|
|
| 21 |
This llama model was trained 2x faster with [Unsloth](https://github.com/unslothai/unsloth) and Huggingface's TRL library.
|
| 22 |
|
| 23 |
[<img src="https://raw.githubusercontent.com/unslothai/unsloth/main/images/unsloth%20made%20with%20love.png" width="200"/>](https://github.com/unslothai/unsloth)
|
| 24 |
+
|
| 25 |
+
# Smollm2_Cyber_Insight
|
| 26 |
+
|
| 27 |
+
## Model Overview
|
| 28 |
+
|
| 29 |
+
**Smollm2_Cyber_Insight** is a lightweight domain-adapted language model fine-tuned for **cybersecurity threat analysis** tasks.
|
| 30 |
+
The model specializes in interpreting short textual descriptions of security incidents and producing structured (JSON) security insights.
|
| 31 |
+
|
| 32 |
+
- **Base Model:** smollm2-1.7b-instruct
|
| 33 |
+
- **Architecture:** SmolLM2
|
| 34 |
+
- **Training Method:** LoRA fine-tuning
|
| 35 |
+
- **Domain:** Cyber Threat Analysis
|
| 36 |
+
- **Model Size:** ~1.7B parameters
|
| 37 |
+
|
| 38 |
+
## Capabilities
|
| 39 |
+
|
| 40 |
+
The model supports the following tasks:
|
| 41 |
+
|
| 42 |
+
- Mapping incidents to **MITRE ATT&CK tactics**
|
| 43 |
+
- Identifying possible **attack techniques**
|
| 44 |
+
- Assessing **incident severity and potential business impact**
|
| 45 |
+
- Assisting in structured cybersecurity analysis
|
| 46 |
+
|
| 47 |
+
## Intended Use
|
| 48 |
+
|
| 49 |
+
This model is suitable for:
|
| 50 |
+
|
| 51 |
+
- Cyber threat intelligence experiments
|
| 52 |
+
- NLP research in cybersecurity
|
| 53 |
+
- Cybersecurity research
|
| 54 |
+
- Prototyping AI-assisted SOC tools
|
| 55 |
+
|
| 56 |
+
## Limitations
|
| 57 |
+
|
| 58 |
+
- Predictions are probabilistic and may require analyst validation
|
| 59 |
+
- Performance depends on similarity to training data
|
| 60 |
+
- Not intended for autonomous security decision-making
|
| 61 |
+
|
| 62 |
+
## Training Data
|
| 63 |
+
|
| 64 |
+
The model was trained on a **specialized cybersecurity dataset** [madox81/mittre_severity_ds](https://huggingface.co/datasets/madox81/mittre_severity_ds) containing incident descriptions and structured labels including:
|
| 65 |
+
|
| 66 |
+
- attack tactics
|
| 67 |
+
- attack techniques
|
| 68 |
+
- incident severity indicators.
|
| 69 |
+
|
| 70 |
+
## Example Prompt
|
| 71 |
+
|
| 72 |
+
|
| 73 |
+
```
|
| 74 |
+
Map the following security event to MITRE ATT&CK tactics and techniques.
|
| 75 |
+
Input: rule apt_lolbin { strings: $a = "certutil.exe" nocase; $b = "-urlfetch" nocase; condition: $a and $b }
|
| 76 |
+
|
| 77 |
+
Identify the ATT&CK tactics and techniques in this data.
|
| 78 |
+
Input: selection: EventName: 'UpdateDomainNameservers' AND SourceIPAddress not in ('aws-internal')
|
| 79 |
+
|
| 80 |
+
Classify this cybersecurity event into MITRE ATT&CK framework.
|
| 81 |
+
Input: rule apt_wasm { strings: $a = "WebAssembly.compile" nocase; $b = "fetch" nocase; condition: $a and $b }
|
| 82 |
+
|
| 83 |
+
Map the following security event to MITRE ATT&CK tactics and techniques.
|
| 84 |
+
Input: Incident Type: Data Breach
|
| 85 |
+
Target: MongoDB Instance
|
| 86 |
+
Vector: Weak Authentication
|
| 87 |
+
|
| 88 |
+
Assess the severity and business risk of the following incident.
|
| 89 |
+
Input: Incident: Phishing affecting HR Accounts.
|
| 90 |
+
|
| 91 |
+
Analyze the business risk and severity for the input below.
|
| 92 |
+
Input: Incident: Supply Chain Attack affecting CI/CD Pipeline.
|
| 93 |
+
|
| 94 |
+
Rate the severity (Low/Medium/High/Critical) and impact of this event.
|
| 95 |
+
Input: Incident: Credential Dumping affecting Windows Domain Controller.
|
| 96 |
+
```
|
| 97 |
+
|
| 98 |
+
## License
|
| 99 |
+
|
| 100 |
+
Refer to the base model license.
|