|
|
--- |
|
|
language: |
|
|
- en |
|
|
license: llama3.1 |
|
|
library_name: transformers |
|
|
base_model: meta-llama/Llama-3.1-8B-Instruct |
|
|
tags: |
|
|
- aws |
|
|
- cloud-security |
|
|
- security-analysis |
|
|
- wazuh |
|
|
- threat-detection |
|
|
- llama |
|
|
- peft |
|
|
- lora |
|
|
- aws-security |
|
|
- cloudtrail |
|
|
- guardduty |
|
|
- compliance |
|
|
pipeline_tag: text-generation |
|
|
widget: |
|
|
- text: 'Analyze this AWS GuardDuty finding: UnauthorizedAccess:EC2/SSHBruteForce from IP 45.142.120.10' |
|
|
example_title: "AWS GuardDuty Alert" |
|
|
- text: 'Analyze CloudTrail event: AttachUserPolicy with AdministratorAccess by root user' |
|
|
example_title: "AWS IAM Policy Change" |
|
|
model-index: |
|
|
- name: aws-security-analyst |
|
|
results: |
|
|
- task: |
|
|
type: text-generation |
|
|
name: AWS Security Analysis |
|
|
metrics: |
|
|
- type: loss |
|
|
value: 0.03 |
|
|
name: Training Loss |
|
|
- type: eval_loss |
|
|
value: 0.08 |
|
|
name: Validation Loss |
|
|
--- |
|
|
|
|
|
# aws-security-analyst |
|
|
|
|
|
## Model Details |
|
|
|
|
|
- **Model Name:** aws-security-analyst |
|
|
- **Base Model:** OpenNix base model(LLaMA 3.1 8B based) |
|
|
- **License:** llama3.1 |
|
|
- **Model Type:** Causal Language Model (Fine-tuned with LoRA for AWS Security) |
|
|
- **Architecture:** 8B parameters |
|
|
- **Specialization:** AWS Cloud Security Events Analysis |
|
|
|
|
|
## Model Description |
|
|
|
|
|
LLaMA 3.1 8B Instruct model fine-tuned for AWS cloud security event analysis. |
|
|
|
|
|
Analyzes events from 20+ AWS security sources including CloudTrail, GuardDuty, Security Hub, Macie, Inspector, Config, VPC Flow Logs, WAF, and more. |
|
|
|
|
|
### Key Features |
|
|
|
|
|
- **20+ AWS Security Sources:** CloudTrail, GuardDuty, SecurityHub, VPCFlow, WAF, Macie, Inspector, Config, etc. |
|
|
- **MITRE ATT&CK Mapping:** 135 cloud techniques, 14 tactics |
|
|
- **Compliance Framework Support:** 195 items (CIS, PCI-DSS, HIPAA, GDPR, FedRAMP, NIST) |
|
|
- **Attack Scenario Detection:** 20 multi-step attack scenarios |
|
|
- **Severity Mapping:** AWS native scales → Wazuh levels (0-15) |
|
|
- **Advanced Analysis:** Threat assessment, incident response recommendations |
|
|
|
|
|
## Training Data |
|
|
|
|
|
- **Total Samples:** 2000 |
|
|
- **AWS Sources:** 20 (CloudTrail, GuardDuty, SecurityHub, VPCFlow, WAF, Macie, Inspector, Config, etc.) |
|
|
- **Attack Scenarios:** 20 multi-step scenarios |
|
|
- **MITRE Techniques:** 135 cloud techniques |
|
|
- **Compliance Items:** 195 (CIS 62, PCI-DSS 49, HIPAA 35, GDPR 15, FedRAMP 3, NIST 31) |
|
|
|
|
|
**Distribution:** |
|
|
- GuardDuty Findings: 86 types |
|
|
- CloudTrail Events: 74 types |
|
|
- Security Hub Findings: CIS, PCI-DSS, HIPAA compliance |
|
|
- VPC Flow Logs: 5 attack patterns |
|
|
|
|
|
## Capabilities |
|
|
|
|
|
### AWS Security Event Analysis |
|
|
|
|
|
```python |
|
|
# Example usage |
|
|
from transformers import AutoModelForCausalLM, AutoTokenizer |
|
|
|
|
|
model = AutoModelForCausalLM.from_pretrained("pyToshka/aws-security-analyst") |
|
|
tokenizer = AutoTokenizer.from_pretrained("pyToshka/aws-security-analyst") |
|
|
|
|
|
# Analyze AWS GuardDuty finding |
|
|
prompt = """Analyze this AWS security event: |
|
|
Event Source: GuardDuty |
|
|
Finding Type: UnauthorizedAccess:EC2/SSHBruteForce |
|
|
Severity: 8.0 |
|
|
Resource: EC2 instance i-1234567890abcdef0 |
|
|
Source IP: 45.142.120.10 |
|
|
|
|
|
Provide: |
|
|
1. Threat assessment |
|
|
2. MITRE ATT&CK techniques |
|
|
3. Compliance impact |
|
|
4. Recommended actions |
|
|
""" |
|
|
|
|
|
inputs = tokenizer(prompt, return_tensors="pt") |
|
|
outputs = model.generate(**inputs, max_new_tokens=512) |
|
|
response = tokenizer.decode(outputs[0]) |
|
|
``` |
|
|
|
|
|
### Supported AWS Sources |
|
|
|
|
|
- CloudTrail API calls |
|
|
- GuardDuty threat findings |
|
|
- Security Hub compliance findings |
|
|
- VPC Flow Logs network traffic |
|
|
- WAF web application attacks |
|
|
- Macie data sensitivity findings |
|
|
- Inspector vulnerability findings |
|
|
- Config compliance events |
|
|
- IAM Access Analyzer findings |
|
|
- Route 53 DNS queries |
|
|
- RDS database logs |
|
|
- EKS Kubernetes audit logs |
|
|
- CloudWatch alarms |
|
|
- EventBridge events |
|
|
- AWS Budgets alerts |
|
|
- Threat Intelligence IOCs |
|
|
|
|
|
## Use Cases |
|
|
|
|
|
- AWS security event triage and analysis |
|
|
- GuardDuty finding interpretation |
|
|
- CloudTrail event investigation |
|
|
- Compliance violation detection (CIS, PCI-DSS, HIPAA, GDPR) |
|
|
- MITRE ATT&CK technique mapping |
|
|
- Multi-source event correlation |
|
|
- Attack scenario detection |
|
|
- Incident response planning |
|
|
|
|
|
## Limitations |
|
|
|
|
|
- Trained on synthetic AWS security events |
|
|
- May require validation on real-world data |
|
|
- Performance depends on input quality |
|
|
- Best used as assistant tool, not replacement for human analysis |
|
|
|
|
|
## Citation |
|
|
|
|
|
If you use this model in your research or application, please cite: |
|
|
|
|
|
```bibtex |
|
|
@misc{{wazuh_aws_security_llama_aws_security_analyst, |
|
|
title={{Wazuh AWS Security Analyst based on LLaMA 3.1 8B}}, |
|
|
author={{pyToshka}}, |
|
|
year={{2025}}, |
|
|
publisher={{HuggingFace}}, |
|
|
url={{https://huggingface.co/pyToshka/aws-security-analyst}} |
|
|
}} |
|
|
``` |
|
|
|
|
|
## Acknowledgments |
|
|
|
|
|
Built with: |
|
|
|
|
|
- **Data:** AWS security documentation, MITRE ATT&CK Cloud Matrix, Wazuh Rules, and more |
|
|
- **Training:** Wazuh, AWS |
|
|
|
|
|
## License |
|
|
|
|
|
This model inherits the LLaMA 3.1 Community License from the base model. |
|
|
|
|
|
## Contact |
|
|
|
|
|
Issues: Please open an issue on the repository |
|
|
|
|
|
## Disclaimer |
|
|
|
|
|
This model is provided for research and educational purposes. Always validate outputs with human security expertise before taking action on security incidents. |
|
|
|