Shoriful025 commited on
Commit
d7d25d2
·
verified ·
1 Parent(s): e4e8e16

Create README.md

Browse files
Files changed (1) hide show
  1. README.md +20 -0
README.md ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # cyber_threat_intent_classifier
2
+
3
+ ## Overview
4
+ The `cyber_threat_intent_classifier` is a fine-tuned BERT model designed to analyze system logs, network traffic descriptions, and security alerts to determine the underlying intent of an observed activity. It categorizes events into five distinct stages of the cyber-attack lifecycle.
5
+
6
+ ## Model Architecture
7
+ - **Base Model:** BERT-base-uncased
8
+ - **Task:** Multi-class Sequence Classification
9
+ - **Layers:** 12-layer, 768-hidden, 12-heads, 110M parameters
10
+ - **Fine-tuning:** Trained on a synthetic dataset of 50,000 security incident reports and MITRE ATT&CK framework descriptions.
11
+
12
+ ## Intended Use
13
+ - **SOC Automation:** Automatically triaging security alerts.
14
+ - **Threat Hunting:** Identifying patterns of reconnaissance or lateral movement in historical logs.
15
+ - **Incident Response:** Providing immediate context to responders regarding the severity and stage of an active threat.
16
+
17
+ ## Limitations
18
+ - **Log Format Sensitivity:** Performs best on descriptive text; raw hexadecimal logs may require pre-processing.
19
+ - **Adversarial Evasion:** Sophisticated attackers may obfuscate their actions to mimic "Informational" traffic.
20
+ - **Context Window:** Limited to 512 tokens, which may exclude relevant details in very long log chains.