File size: 1,352 Bytes
3a98921
 
 
 
 
 
5d3aa38
 
3b0efbd
1bbef38
5d3aa38
 
 
 
 
3a98921
e8b403b
5d3aa38
3a98921
5d3aa38
3a98921
5d3aa38
3a98921
5d3aa38
3a98921
5d3aa38
3a98921
 
5d3aa38
 
 
 
3a98921
5d3aa38
3c90e5c
5d3aa38
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
---
license: mit
datasets:
- Mireu-Lab/NSL-KDD
metrics:
- accuracy
- f1
base_model: Qwen/Qwen2.5-0.5B
pipeline_tag: question-answering
tags:
- intrusion-detection
- cybersecurity
- llm
- qwen
- tabular-reasoning
---

# PCF_ID: A Novel Prompt Cast Framework for Intrusion Detection

[![Hugging Face Model](https://img.shields.io/badge/Hugging%20Face-Model-blue)](https://huggingface.co/PHZane/PCF_ID-0.5B)
[![Python 3.8+](https://img.shields.io/badge/Python-3.8%2B-blue)](https://www.python.org/)
[![License](https://img.shields.io/badge/License-MIT-green.svg)](https://opensource.org/licenses/MIT)

## 馃搶 Model Overview

**PCF_ID-0.5B** is a fine-tuned version of **Qwen2.5-0.5B**, adapted for network intrusion detection using the **Prompt Cast Framework (PCF-ID)**. By transforming structured tabular records into semantically rich **Question鈥揜easoning鈥揂nswer (Q-R-A)** prompts, PCF_ID enables large language models to effectively reason over cybersecurity data.


PCF_ID-0.5B significantly outperforms:
- Raw LLMs (e.g., vanilla Qwen2.5-0.5B),
- Traditional machine learning models (e.g., Random Forest, SVM),
- Advanced graph neural networks (GNNs).

## 馃捇 Code & Reproduction

The full framework, preprocessing pipeline, and evaluation scripts are available at:  
馃敆 [https://github.com/Zaneph1/PCF_ID](https://github.com/Zaneph1/PCF_ID)