Update README.md
Browse files
README.md
CHANGED
@@ -3,200 +3,133 @@ base_model: meta-llama/Meta-Llama-3.1-8B-Instruct
|
|
3 |
library_name: peft
|
4 |
---
|
5 |
|
6 |
-
# Model Card for
|
7 |
-
|
8 |
-
<!-- Provide a quick summary of what the model is/does. -->
|
9 |
-
|
10 |
|
|
|
11 |
|
12 |
## Model Details
|
13 |
|
14 |
### Model Description
|
15 |
|
16 |
-
|
17 |
-
|
18 |
-
|
19 |
|
20 |
-
- **Developed by:** [
|
21 |
-
- **
|
22 |
-
- **
|
23 |
-
- **
|
24 |
-
- **
|
25 |
-
- **License:** [More Information Needed]
|
26 |
-
- **Finetuned from model [optional]:** [More Information Needed]
|
27 |
|
28 |
### Model Sources [optional]
|
29 |
|
30 |
-
|
31 |
-
|
32 |
-
- **
|
33 |
-
- **Paper [optional]:** [More Information Needed]
|
34 |
-
- **Demo [optional]:** [More Information Needed]
|
35 |
|
36 |
## Uses
|
37 |
|
38 |
-
<!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
|
39 |
-
|
40 |
### Direct Use
|
41 |
|
42 |
-
|
43 |
-
|
44 |
-
|
45 |
-
|
46 |
-
|
47 |
-
|
48 |
-
<!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
|
49 |
-
|
50 |
-
[More Information Needed]
|
51 |
|
52 |
### Out-of-Scope Use
|
53 |
|
54 |
-
|
55 |
-
|
56 |
-
|
|
|
57 |
|
58 |
## Bias, Risks, and Limitations
|
59 |
|
60 |
-
|
61 |
-
|
62 |
-
|
63 |
|
64 |
### Recommendations
|
65 |
|
66 |
-
|
67 |
-
|
68 |
-
Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
|
69 |
|
70 |
## How to Get Started with the Model
|
71 |
|
72 |
-
Use the code
|
73 |
-
|
74 |
-
[More Information Needed]
|
75 |
|
76 |
-
|
77 |
-
|
78 |
-
|
79 |
|
80 |
-
|
|
|
|
|
|
|
|
|
81 |
|
82 |
-
|
|
|
83 |
|
84 |
-
|
|
|
|
|
|
|
|
|
|
|
85 |
|
86 |
-
|
87 |
|
88 |
-
|
89 |
|
90 |
-
[
|
91 |
|
|
|
92 |
|
93 |
#### Training Hyperparameters
|
94 |
|
95 |
-
- **Training regime:**
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
|
103 |
## Evaluation
|
104 |
|
105 |
-
|
106 |
-
|
107 |
-
### Testing Data, Factors & Metrics
|
108 |
-
|
109 |
-
#### Testing Data
|
110 |
-
|
111 |
-
<!-- This should link to a Dataset Card if possible. -->
|
112 |
-
|
113 |
-
[More Information Needed]
|
114 |
-
|
115 |
-
#### Factors
|
116 |
-
|
117 |
-
<!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
|
118 |
-
|
119 |
-
[More Information Needed]
|
120 |
-
|
121 |
-
#### Metrics
|
122 |
-
|
123 |
-
<!-- These are the evaluation metrics being used, ideally with a description of why. -->
|
124 |
-
|
125 |
-
[More Information Needed]
|
126 |
-
|
127 |
-
### Results
|
128 |
-
|
129 |
-
[More Information Needed]
|
130 |
-
|
131 |
-
#### Summary
|
132 |
-
|
133 |
-
|
134 |
-
|
135 |
-
## Model Examination [optional]
|
136 |
-
|
137 |
-
<!-- Relevant interpretability work for the model goes here -->
|
138 |
-
|
139 |
-
[More Information Needed]
|
140 |
-
|
141 |
## Environmental Impact
|
142 |
|
143 |
-
|
144 |
-
|
145 |
-
|
146 |
|
147 |
-
- **Hardware Type:** [More Information Needed]
|
148 |
-
- **Hours used:** [More Information Needed]
|
149 |
-
- **Cloud Provider:** [More Information Needed]
|
150 |
-
- **Compute Region:** [More Information Needed]
|
151 |
-
- **Carbon Emitted:** [More Information Needed]
|
152 |
|
153 |
## Technical Specifications [optional]
|
154 |
|
155 |
### Model Architecture and Objective
|
156 |
|
157 |
-
|
158 |
|
159 |
### Compute Infrastructure
|
160 |
|
161 |
-
[More Information Needed]
|
162 |
-
|
163 |
#### Hardware
|
164 |
|
165 |
-
|
166 |
|
167 |
#### Software
|
168 |
|
169 |
-
|
170 |
-
|
171 |
-
|
172 |
-
|
173 |
-
<!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
|
174 |
-
|
175 |
-
**BibTeX:**
|
176 |
-
|
177 |
-
[More Information Needed]
|
178 |
-
|
179 |
-
**APA:**
|
180 |
-
|
181 |
-
[More Information Needed]
|
182 |
-
|
183 |
-
## Glossary [optional]
|
184 |
-
|
185 |
-
<!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
|
186 |
-
|
187 |
-
[More Information Needed]
|
188 |
-
|
189 |
-
## More Information [optional]
|
190 |
-
|
191 |
-
[More Information Needed]
|
192 |
|
193 |
## Model Card Authors [optional]
|
194 |
|
195 |
-
|
196 |
|
197 |
## Model Card Contact
|
198 |
|
199 |
-
|
200 |
-
|
201 |
|
202 |
-
-
|
|
|
3 |
library_name: peft
|
4 |
---
|
5 |
|
6 |
+
# Model Card for LLaMA 3.1 8B Instruct - Cybersecurity Fine-tuned
|
|
|
|
|
|
|
7 |
|
8 |
+
This model is a fine-tuned version of the LLaMA 3.1 8B Instruct model, specifically adapted for cybersecurity-related tasks.
|
9 |
|
10 |
## Model Details
|
11 |
|
12 |
### Model Description
|
13 |
|
14 |
+
This model is based on the LLaMA 3.1 8B Instruct model and has been fine-tuned on a custom dataset of cybersecurity-related questions and answers. It is designed to provide more accurate and relevant responses to queries in the cybersecurity domain.
|
|
|
|
|
15 |
|
16 |
+
- **Developed by:** [Your Name/Organization]
|
17 |
+
- **Model type:** Instruct-tuned Large Language Model
|
18 |
+
- **Language(s) (NLP):** English (primary), with potential for limited multilingual capabilities
|
19 |
+
- **License:** [Specify the license, likely related to the original LLaMA 3.1 license]
|
20 |
+
- **Finetuned from model:** meta-llama/Meta-Llama-3.1-8B-Instruct
|
|
|
|
|
21 |
|
22 |
### Model Sources [optional]
|
23 |
|
24 |
+
- **Repository:** [Link to your Hugging Face repository]
|
25 |
+
- **Paper [optional]:** [If you've written a paper about this fine-tuning, link it here]
|
26 |
+
- **Demo [optional]:** [If you have a demo of the model, link it here]
|
|
|
|
|
27 |
|
28 |
## Uses
|
29 |
|
|
|
|
|
30 |
### Direct Use
|
31 |
|
32 |
+
This model can be used for a variety of cybersecurity-related tasks, including:
|
33 |
+
- Answering questions about cybersecurity concepts and practices
|
34 |
+
- Providing explanations of cybersecurity threats and vulnerabilities
|
35 |
+
- Assisting in the interpretation of security logs and indicators of compromise
|
36 |
+
- Offering guidance on best practices for cyber defense
|
|
|
|
|
|
|
|
|
37 |
|
38 |
### Out-of-Scope Use
|
39 |
|
40 |
+
This model should not be used for:
|
41 |
+
- Generating or assisting in the creation of malicious code
|
42 |
+
- Providing legal or professional security advice without expert oversight
|
43 |
+
- Making critical security decisions without human verification
|
44 |
|
45 |
## Bias, Risks, and Limitations
|
46 |
|
47 |
+
- The model may reflect biases present in its training data and the original LLaMA 3.1 model.
|
48 |
+
- It may occasionally generate incorrect or inconsistent information, especially for very specific or novel cybersecurity topics.
|
49 |
+
- The model's knowledge is limited to its training data cutoff and does not include real-time threat intelligence.
|
50 |
|
51 |
### Recommendations
|
52 |
|
53 |
+
Users should verify critical information and consult with cybersecurity professionals for important decisions. The model should be used as an assistant tool, not as a replacement for expert knowledge or up-to-date threat intelligence.
|
|
|
|
|
54 |
|
55 |
## How to Get Started with the Model
|
56 |
|
57 |
+
Use the following code to get started with the model:
|
|
|
|
|
58 |
|
59 |
+
```python
|
60 |
+
from transformers import AutoTokenizer, AutoModelForCausalLM
|
61 |
+
from peft import PeftModel, PeftConfig
|
62 |
|
63 |
+
# Load the model
|
64 |
+
model_name = "your-username/llama3-cybersecurity"
|
65 |
+
config = PeftConfig.from_pretrained(model_name)
|
66 |
+
model = AutoModelForCausalLM.from_pretrained(config.base_model_name_or_path)
|
67 |
+
model = PeftModel.from_pretrained(model, model_name)
|
68 |
|
69 |
+
# Load the tokenizer
|
70 |
+
tokenizer = AutoTokenizer.from_pretrained(config.base_model_name_or_path)
|
71 |
|
72 |
+
# Example usage
|
73 |
+
prompt = "What are some common indicators of a ransomware attack?"
|
74 |
+
inputs = tokenizer(prompt, return_tensors="pt")
|
75 |
+
outputs = model.generate(**inputs, max_length=200)
|
76 |
+
print(tokenizer.decode(outputs[0], skip_special_tokens=True))
|
77 |
+
```
|
78 |
|
79 |
+
## Training Details
|
80 |
|
81 |
+
### Training Data
|
82 |
|
83 |
+
The model was fine-tuned on a custom dataset of cybersecurity-related questions and answers. [Add more details about your dataset here]
|
84 |
|
85 |
+
### Training Procedure
|
86 |
|
87 |
#### Training Hyperparameters
|
88 |
|
89 |
+
- **Training regime:** bf16 mixed precision
|
90 |
+
- **Optimizer:** AdamW
|
91 |
+
- **Learning rate:** 5e-5
|
92 |
+
- **Batch size:** 4
|
93 |
+
- **Gradient accumulation steps:** 4
|
94 |
+
- **Epochs:** 5
|
95 |
+
- **Max steps:** 4000
|
96 |
|
97 |
## Evaluation
|
98 |
|
99 |
+
I used a custom yara evulation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
100 |
## Environmental Impact
|
101 |
|
102 |
+
- **Hardware Type:** NVIDIA A100
|
103 |
+
- **Hours used:** 12 Hours
|
104 |
+
- **Cloud Provider:** vast.io
|
105 |
|
|
|
|
|
|
|
|
|
|
|
106 |
|
107 |
## Technical Specifications [optional]
|
108 |
|
109 |
### Model Architecture and Objective
|
110 |
|
111 |
+
This model uses the LLaMA 3.1 8B architecture with additional LoRA adapters for fine-tuning. It was trained using a causal language modeling objective on cybersecurity-specific data.
|
112 |
|
113 |
### Compute Infrastructure
|
114 |
|
|
|
|
|
115 |
#### Hardware
|
116 |
|
117 |
+
"Single NVIDIA A100 GPU"
|
118 |
|
119 |
#### Software
|
120 |
|
121 |
+
- Python 3.8+
|
122 |
+
- PyTorch 2.0+
|
123 |
+
- Transformers 4.28+
|
124 |
+
- PEFT 0.12.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
125 |
|
126 |
## Model Card Authors [optional]
|
127 |
|
128 |
+
Wyatt Roersma
|
129 |
|
130 |
## Model Card Contact
|
131 |
|
132 |
+
Email me at wyattroersma@gmail.com with questions.
|
133 |
+
```
|
134 |
|
135 |
+
This README.md provides a comprehensive overview of your fine-tuned model, including its purpose, capabilities, limitations, and technical details. You should replace the placeholder text (like "[Your Name/Organization]") with the appropriate information. Additionally, you may want to expand on certain sections, such as the evaluation metrics and results, if you have more specific data available from your fine-tuning process.
|