File size: 1,352 Bytes
3a98921 5d3aa38 3b0efbd 1bbef38 5d3aa38 3a98921 e8b403b 5d3aa38 3a98921 5d3aa38 3a98921 5d3aa38 3a98921 5d3aa38 3a98921 5d3aa38 3a98921 5d3aa38 3a98921 5d3aa38 3c90e5c 5d3aa38 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 |
---
license: mit
datasets:
- Mireu-Lab/NSL-KDD
metrics:
- accuracy
- f1
base_model: Qwen/Qwen2.5-0.5B
pipeline_tag: question-answering
tags:
- intrusion-detection
- cybersecurity
- llm
- qwen
- tabular-reasoning
---
# PCF_ID: A Novel Prompt Cast Framework for Intrusion Detection
[](https://huggingface.co/PHZane/PCF_ID-0.5B)
[](https://www.python.org/)
[](https://opensource.org/licenses/MIT)
## 馃搶 Model Overview
**PCF_ID-0.5B** is a fine-tuned version of **Qwen2.5-0.5B**, adapted for network intrusion detection using the **Prompt Cast Framework (PCF-ID)**. By transforming structured tabular records into semantically rich **Question鈥揜easoning鈥揂nswer (Q-R-A)** prompts, PCF_ID enables large language models to effectively reason over cybersecurity data.
PCF_ID-0.5B significantly outperforms:
- Raw LLMs (e.g., vanilla Qwen2.5-0.5B),
- Traditional machine learning models (e.g., Random Forest, SVM),
- Advanced graph neural networks (GNNs).
## 馃捇 Code & Reproduction
The full framework, preprocessing pipeline, and evaluation scripts are available at:
馃敆 [https://github.com/Zaneph1/PCF_ID](https://github.com/Zaneph1/PCF_ID) |