--- base_model: mistralai/Mixtral-8x7B-Instruct-v0.1 library_name: peft tags: - cybersecurity - malware-analysis - peft - lora - qlora - mixtral language: - en pipeline_tag: text-generation license: apache-2.0 --- # Fathom Plan A LoRA Adapter (Mixtral-8x7B-Instruct) This repository contains the **Plan A** LoRA adapter for the Fathom FYP project: **"Fathom: An LLM-Powered Automated Malware Analysis Framework"** The adapter is trained on a curated cybersecurity instruction-tuning corpus to improve analyst-style security outputs over the base `mistralai/Mixtral-8x7B-Instruct-v0.1` model. ## What This Is - **Type:** PEFT LoRA adapter (not a full standalone model) - **Base model required:** `mistralai/Mixtral-8x7B-Instruct-v0.1` - **Training style:** QLoRA (4-bit NF4 base loading, bf16 compute) - **Scope:** Plan A MVP uplift for cybersecurity and malware-analysis assistance ## Key Training Setup - **Sequence length:** 2048 - **Batch:** 2 - **Gradient accumulation:** 8 (effective 16) - **Learning rate:** 2e-4 (cosine scheduler) - **Steps:** 3000 (completed run) - **LoRA rank/alpha:** r=32, alpha=64 - **LoRA targets:** `q_proj`, `k_proj`, `v_proj`, `o_proj` (attention-only) - **Optimizer:** paged_adamw_8bit - **Precision:** bf16 ## Hardware Used Training was run on RunPod: - **GPU:** NVIDIA A100 PCIe 80GB (1x) - **vCPU:** 8 - **RAM:** 125 GB - **Disk:** 200 GB - **Location:** CA ## Data Summary Curated cybersecurity instruction corpus with mixed sources (CyberMetric, Trendyol CyberSec, ShareGPT Cybersecurity, NIST downsampled, MITRE ATT&CK, CVE/IR/malware-focused sets). Final working files used: - `train.jsonl`: 120,912 samples - `eval.jsonl`: 1,915 samples - `cybermetric_80.jsonl`: 80 held-out MCQs - `malware_eval_25.jsonl`: 25 expert malware prompts ## Evaluation Results ### Standard post-eval settings Generation settings used for fair base-vs-adapter comparison: - `do_sample=False` - `temperature=0.0` - `max_new_eval=64` - `max_new_cyber=48` - `max_new_malware=256` #### Baseline (corrected) vs Fine-tuned | Metric | Baseline | Fine-tuned | Delta | |---|---:|---:|---:| | Eval mean overlap | 0.3283 | 0.3631 | +0.0349 | | Eval exact match rate | 0.0000 | 0.2193 | +0.2193 | | CyberMetric-80 accuracy | 0.825 | 0.900 | +0.075 | | Malware structure | 0.44 | 0.84 | +0.40 | | Malware ATT&CK correctness | 0.16 | 0.20 | +0.04 | | Malware reasoning | 0.24 | 0.20 | -0.04 | | Malware evidence awareness | 0.48 | 0.52 | +0.04 | | Malware analyst usefulness | 0.52 | 0.56 | +0.04 | ### Malware-only rerun with longer output budget To test truncation effects on malware prompts, both base and fine-tuned were rerun with `max_new_malware=512` (25 prompts only). | Rubric axis | Base (512) | Fine-tuned (512) | Delta | |---|---:|---:|---:| | Structure | 0.56 | 0.88 | +0.32 | | ATT&CK correctness | 0.16 | 0.20 | +0.04 | | Malware reasoning | 0.36 | 0.28 | -0.08 | | Evidence awareness | 0.56 | 0.64 | +0.08 | | Analyst usefulness | 0.64 | 0.80 | +0.16 | Interpretation: structure/evidence/usefulness improved strongly, but malware reasoning remains the main gap for future iterations. ## Limitations - This is a **Plan A MVP adapter**, not a fully specialized malware reverse-engineering model. - Malware causal reasoning still needs improvement via targeted data and/or evidence-grounded training (Plan B). - Outputs should be treated as analyst assistance, not an autonomous verdict. ## Usage ```python import torch from transformers import AutoModelForCausalLM, AutoTokenizer, BitsAndBytesConfig from peft import PeftModel base_model_id = "mistralai/Mixtral-8x7B-Instruct-v0.1" adapter_repo = "umer07/fathom-mixtral-lora-plan-a" bnb_config = BitsAndBytesConfig( load_in_4bit=True, bnb_4bit_quant_type="nf4", bnb_4bit_use_double_quant=True, bnb_4bit_compute_dtype=torch.bfloat16, ) tokenizer = AutoTokenizer.from_pretrained(base_model_id, use_fast=True) if tokenizer.pad_token is None: tokenizer.pad_token = tokenizer.eos_token model = AutoModelForCausalLM.from_pretrained( base_model_id, quantization_config=bnb_config, device_map={"": 0}, torch_dtype=torch.bfloat16, low_cpu_mem_usage=True, ) model = PeftModel.from_pretrained(model, adapter_repo) model.eval() prompt = """### Instruction: Analyze the malware behavior and map likely ATT&CK techniques. ### Input: Sample creates scheduled task persistence and launches encoded PowerShell. ### Response: """ inputs = tokenizer(prompt, return_tensors="pt").to(model.device) with torch.inference_mode(): out = model.generate(**inputs, max_new_tokens=512, do_sample=False, temperature=0.0) print(tokenizer.decode(out[0][inputs["input_ids"].shape[1]:], skip_special_tokens=True)) ``` ## Project Status - Core Plan A training/evaluation cycle: **completed** - GPU instance used for training has been deleted - No additional training is currently in progress ## Citation If you use this adapter, please cite your project report/thesis for Fathom Plan A and reference the base model (`mistralai/Mixtral-8x7B-Instruct-v0.1`).