caffeinatedcherrychic
commited on
Commit
•
db6117d
1
Parent(s):
d68a778
Update README.md
Browse files
README.md
CHANGED
@@ -103,23 +103,24 @@ special_tokens:
|
|
103 |
|
104 |
# qlora-out
|
105 |
|
106 |
-
This model is a fine-tuned version of [mistralai/Mistral-7B-v0.1](https://huggingface.co/mistralai/Mistral-7B-v0.1) on the
|
107 |
It achieves the following results on the evaluation set:
|
108 |
- Loss: 0.1465
|
109 |
|
110 |
-
|
111 |
|
112 |
-
|
113 |
|
114 |
-
##
|
|
|
|
|
|
|
|
|
|
|
|
|
115 |
|
116 |
-
|
117 |
-
|
118 |
-
## Training and evaluation data
|
119 |
-
|
120 |
-
More information needed
|
121 |
-
|
122 |
-
## Training procedure
|
123 |
|
124 |
### Training hyperparameters
|
125 |
|
|
|
103 |
|
104 |
# qlora-out
|
105 |
|
106 |
+
This model is a fine-tuned version of [mistralai/Mistral-7B-v0.1](https://huggingface.co/mistralai/Mistral-7B-v0.1) on the CIDDS dataset.
|
107 |
It achieves the following results on the evaluation set:
|
108 |
- Loss: 0.1465
|
109 |
|
110 |
+
# Mistral based NIDS
|
111 |
|
112 |
+
This repository contains an implementation of a Network Intrusion Detection System (NIDS) based on the Mistral Large Language Model (LLM). The system is designed to detect and classify network attacks using natural language processing techniques.
|
113 |
|
114 |
+
## Overview
|
115 |
+
- **LLM**:
|
116 |
+
- The NIDS is built using the Mistral LLM, a powerful language model that enables the system to understand and analyze network traffic logs.
|
117 |
+
- Another LLM, Llama2, was fine-tuned and the performance of the two were compared. The link to my implementation of Llama2-based can be found [here](https://huggingface.co/caffeinatedcherrychic/Llama2-based-NIDS).
|
118 |
+
- **Dataset**: The system is trained and evaluated on the CIDDS dataset, which includes various types of network attacks such as DoS, PortScan, Brute Force, and PingScan.
|
119 |
+
- **Training**: The LLM is fine-tuned on the CIDDS dataset after it was pre-processed using the [NTFA tool](https://github.com/KayvanKarim/ntfa) to learn the patterns and characteristics of different network attacks.
|
120 |
+
- **Inference**: The trained model is used to classify network traffic logs in real-time, identifying potential attacks and generating alerts.
|
121 |
|
122 |
+
## Results
|
123 |
+
The mistral-based NIDS achieves a higher detection rate with lower false positives, demonstrating the effectiveness of using LLMs for network intrusion detection. With access to computational resources for longer periods, It's performance could further be improved.
|
|
|
|
|
|
|
|
|
|
|
124 |
|
125 |
### Training hyperparameters
|
126 |
|