| --- |
| license: mit |
| datasets: |
| - Mireu-Lab/NSL-KDD |
| metrics: |
| - accuracy |
| - f1 |
| base_model: Qwen/Qwen2.5-1.5B |
| pipeline_tag: question-answering |
| tags: |
| - intrusion-detection |
| - cybersecurity |
| - llm |
| - qwen |
| - tabular-reasoning |
| --- |
| # PCF_ID: A Novel Prompt Cast Framework for Intrusion Detection |
| [](https://huggingface.co/PHZane/PCF_ID-0.5B) |
| [](https://www.python.org/) |
| [](https://opensource.org/licenses/MIT) |
| ## 馃搶 Model Overview |
| **PCF_ID-1.5B** is a fine-tuned version of **Qwen2.5-1.5B**, adapted for network intrusion detection using the **Prompt Cast Framework (PCF-ID)**. By transforming structured tabular records into semantically rich **Question鈥揜easoning鈥揂nswer (Q-R-A)** prompts, PCF_ID enables large language models to effectively reason over cybersecurity data. |
|
|
|
|
| PCF_ID-1.5B significantly outperforms: |
| - Raw LLMs (e.g., vanilla Qwen2.5-1.5B), |
| - Traditional machine learning models (e.g., Random Forest, SVM), |
| - Advanced graph neural networks (GNNs). |
| ## 馃捇 Code & Reproduction |
| The full framework, preprocessing pipeline, and evaluation scripts are available at: |
| 馃敆 [https://github.com/Zaneph1/PCF_ID](https://github.com/Zaneph1/PCF_ID) |