Yeico commited on
Commit
40d9197
·
verified ·
1 Parent(s): d6383dd

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +50 -175
README.md CHANGED
@@ -1,202 +1,77 @@
1
  ---
2
  base_model: distilbert-base-uncased
3
  library_name: peft
 
 
 
 
 
 
 
 
4
  ---
5
 
6
- # Model Card for Model ID
7
 
8
- <!-- Provide a quick summary of what the model is/does. -->
9
 
 
10
 
 
11
 
12
- ## Model Details
13
-
14
- ### Model Description
15
-
16
- <!-- Provide a longer summary of what this model is. -->
17
-
18
-
19
-
20
- - **Developed by:** [More Information Needed]
21
- - **Funded by [optional]:** [More Information Needed]
22
- - **Shared by [optional]:** [More Information Needed]
23
- - **Model type:** [More Information Needed]
24
- - **Language(s) (NLP):** [More Information Needed]
25
- - **License:** [More Information Needed]
26
- - **Finetuned from model [optional]:** [More Information Needed]
27
-
28
- ### Model Sources [optional]
29
-
30
- <!-- Provide the basic links for the model. -->
31
-
32
- - **Repository:** [More Information Needed]
33
- - **Paper [optional]:** [More Information Needed]
34
- - **Demo [optional]:** [More Information Needed]
35
-
36
- ## Uses
37
-
38
- <!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
39
-
40
- ### Direct Use
41
-
42
- <!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
43
-
44
- [More Information Needed]
45
-
46
- ### Downstream Use [optional]
47
-
48
- <!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
49
-
50
- [More Information Needed]
51
-
52
- ### Out-of-Scope Use
53
-
54
- <!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
55
-
56
- [More Information Needed]
57
-
58
- ## Bias, Risks, and Limitations
59
-
60
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
61
-
62
- [More Information Needed]
63
-
64
- ### Recommendations
65
-
66
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
67
-
68
- Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
69
-
70
- ## How to Get Started with the Model
71
-
72
- Use the code below to get started with the model.
73
-
74
- [More Information Needed]
75
-
76
- ## Training Details
77
-
78
- ### Training Data
79
-
80
- <!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
81
-
82
- [More Information Needed]
83
-
84
- ### Training Procedure
85
-
86
- <!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
87
-
88
- #### Preprocessing [optional]
89
-
90
- [More Information Needed]
91
-
92
-
93
- #### Training Hyperparameters
94
-
95
- - **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
96
-
97
- #### Speeds, Sizes, Times [optional]
98
-
99
- <!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
100
-
101
- [More Information Needed]
102
-
103
- ## Evaluation
104
-
105
- <!-- This section describes the evaluation protocols and provides the results. -->
106
-
107
- ### Testing Data, Factors & Metrics
108
-
109
- #### Testing Data
110
-
111
- <!-- This should link to a Dataset Card if possible. -->
112
-
113
- [More Information Needed]
114
-
115
- #### Factors
116
-
117
- <!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
118
-
119
- [More Information Needed]
120
-
121
- #### Metrics
122
-
123
- <!-- These are the evaluation metrics being used, ideally with a description of why. -->
124
-
125
- [More Information Needed]
126
-
127
- ### Results
128
-
129
- [More Information Needed]
130
-
131
- #### Summary
132
-
133
-
134
-
135
- ## Model Examination [optional]
136
-
137
- <!-- Relevant interpretability work for the model goes here -->
138
-
139
- [More Information Needed]
140
-
141
- ## Environmental Impact
142
-
143
- <!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
144
-
145
- Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
146
-
147
- - **Hardware Type:** [More Information Needed]
148
- - **Hours used:** [More Information Needed]
149
- - **Cloud Provider:** [More Information Needed]
150
- - **Compute Region:** [More Information Needed]
151
- - **Carbon Emitted:** [More Information Needed]
152
-
153
- ## Technical Specifications [optional]
154
-
155
- ### Model Architecture and Objective
156
-
157
- [More Information Needed]
158
-
159
- ### Compute Infrastructure
160
-
161
- [More Information Needed]
162
-
163
- #### Hardware
164
-
165
- [More Information Needed]
166
 
167
- #### Software
168
 
169
- [More Information Needed]
170
 
171
- ## Citation [optional]
 
 
172
 
173
- <!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
174
 
175
- **BibTeX:**
176
 
177
- [More Information Needed]
178
 
179
- **APA:**
180
 
181
- [More Information Needed]
 
 
 
 
 
182
 
183
- ## Glossary [optional]
184
 
185
- <!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
186
 
187
- [More Information Needed]
188
 
189
- ## More Information [optional]
190
 
191
- [More Information Needed]
 
 
192
 
193
- ## Model Card Authors [optional]
194
 
195
- [More Information Needed]
 
196
 
197
- ## Model Card Contact
 
198
 
199
- [More Information Needed]
200
- ### Framework versions
201
 
202
- - PEFT 0.14.0
 
 
1
  ---
2
  base_model: distilbert-base-uncased
3
  library_name: peft
4
+ tags:
5
+ - ransomware
6
+ - IoT
7
+ - cybersecurity
8
+ - LoRA
9
+ - peft
10
+ - transformers
11
+ - distilbert
12
  ---
13
 
14
+ # RansenEO: An Encoder-Only SLM with Fine-Tuning for ransomware detection in IoT
15
 
16
+ This model is a lightweight LoRA adapter trained on network traffic data from IoT environments to detect the presence of ransomware. It performs binary classification—distinguishing between normal and ransomware-related network flows—using a DistilBERT-based architecture and is optimized for deployment in resource-constrained IoT devices.
17
 
18
+ ---
19
 
20
+ ## 🧠 Model Details
21
 
22
+ - **Base Model:** [`distilbert-base-uncased`](https://huggingface.co/distilbert-base-uncased)
23
+ - **Adapter Type:** LoRA (via [PEFT](https://github.com/huggingface/peft))
24
+ - **Target Modules:** `q_lin`, `v_lin`
25
+ - **LoRA Rank (r):** 8
26
+ - **Epochs Trained:** 5
27
+ - **Model Type:** Binary Classifier (Ransomware Detection)
28
+ - **Intended Use:** Detection of ransomware in IoT environment
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
29
 
30
+ ---
31
 
32
+ ## 📚 Training Data
33
 
34
+ - **Dataset:** Forge-IIoT (IoTForge Pro)
35
+ - **Reference:**
36
+ _Umar P, Mullick S, Das R, Nandi A, Banerjee I. IoTForge Pro. IEEE Internet of Things Journal 2024. doi: 10.21227/c4z1-yc52_
37
 
38
+ - The dataset contains la comprehensive security testbed designed to generate a diverse and extensive intrusion dataset for IIoT environments. The testbed simulates various IIoT scenarios, incorporating network topologies and communication protocols to create realistic attack vectors and normal traffic patterns. The generated dataset, named ForgeIIOT, includes various attack types, such as denial-of-service, man-in-the-middle, ransomware, wildcard abuse and malware-based intrusions
39
 
40
+ ---
41
 
42
+ ## 📈 Evaluation
43
 
44
+ The model was evaluated on a held-out test set using the following metrics:
45
 
46
+ - **Accuracy**
47
+ - **F1-Score**
48
+ - **Matthews Correlation Coefficient (MCC)**
49
+ - **Inference Time**
50
+ - **Model Size (MB)**
51
+ - **RAM Usage (MB)**
52
 
53
+ These metrics ensure the model is not only accurate but also efficient for use in IoT scenarios.
54
 
55
+ ---
56
 
57
+ ## 🚀 Usage
58
 
59
+ To use the adapter with the base model in your project:
60
 
61
+ ```python
62
+ from transformers import AutoTokenizer, AutoModelForSequenceClassification
63
+ from peft import PeftModel, PeftConfig
64
 
65
+ peft_model_id = "yeico/RansenEO"
66
 
67
+ # Load PEFT config
68
+ config = PeftConfig.from_pretrained(peft_model_id)
69
 
70
+ # Load base model
71
+ base_model = AutoModelForSequenceClassification.from_pretrained(config.base_model_name_or_path)
72
 
73
+ # Load LoRA adapter
74
+ model = PeftModel.from_pretrained(base_model, peft_model_id)
75
 
76
+ # Load tokenizer
77
+ tokenizer = AutoTokenizer.from_pretrained(config.base_model_name_or_path)