Shoriful025 commited on
Commit
c197069
·
verified ·
1 Parent(s): 7c0ea8d

Create README.md

Browse files
Files changed (1) hide show
  1. README.md +33 -0
README.md ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: mit
3
+ tags:
4
+ - cybersecurity
5
+ - tabular
6
+ - tabnet
7
+ - network-security
8
+ - intrusion-detection
9
+ ---
10
+
11
+ # cybersecurity_threat_classifier_tabnet
12
+
13
+ ## Overview
14
+ This model utilizes the **TabNet** architecture to perform high-performance classification on tabular network traffic data. It is specifically designed to detect various types of cyber attacks (DDoS, Botnets, etc.) by mimicking the decision-making process of tree-based models while retaining the gradient-based learning advantages of neural networks.
15
+
16
+
17
+
18
+ ## Model Architecture
19
+ The model uses a sequential attention mechanism to focus on the most salient features of a network packet:
20
+ - **Feature Transformer**: Processes the input features through shared and independent GLU (Gated Linear Unit) layers.
21
+ - **Attentive Transformer**: Learns a sparse mask to select which features the model should "look at" in each decision step.
22
+ - **Sparsity Regularization**: Uses entropy-based loss to ensure the model uses a minimal number of features:
23
+ $$L_{sparse} = \sum_{i=1}^{N_{steps}} \sum_{j=1}^{D} -M_{i,j} \log(M_{i,j} + \epsilon)$$
24
+
25
+ ## Intended Use
26
+ - **IDS/IPS Systems**: Real-time classification of network flows in enterprise firewalls.
27
+ - **Forensic Analysis**: Post-hoc analysis of log files to identify patterns of infiltration.
28
+ - **Threat Hunting**: Identifying anomalous behavior in high-dimensional telemetry data from zero-trust environments.
29
+
30
+ ## Limitations
31
+ - **Feature Engineering**: The model is highly dependent on the quality of input features (e.g., flow duration, packet size variance).
32
+ - **Adversarial Attacks**: Highly sophisticated attackers can craft "adversarial traffic" designed to mimic benign flow statistics.
33
+ - **Concept Drift**: As new attack vectors emerge, the model requires retraining on updated traffic samples to maintain precision.