caffeinatedcherrychic commited on
Commit
db6117d
1 Parent(s): d68a778

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +12 -11
README.md CHANGED
@@ -103,23 +103,24 @@ special_tokens:
103
 
104
  # qlora-out
105
 
106
- This model is a fine-tuned version of [mistralai/Mistral-7B-v0.1](https://huggingface.co/mistralai/Mistral-7B-v0.1) on the None dataset.
107
  It achieves the following results on the evaluation set:
108
  - Loss: 0.1465
109
 
110
- ## Model description
111
 
112
- More information needed
113
 
114
- ## Intended uses & limitations
 
 
 
 
 
 
115
 
116
- More information needed
117
-
118
- ## Training and evaluation data
119
-
120
- More information needed
121
-
122
- ## Training procedure
123
 
124
  ### Training hyperparameters
125
 
 
103
 
104
  # qlora-out
105
 
106
+ This model is a fine-tuned version of [mistralai/Mistral-7B-v0.1](https://huggingface.co/mistralai/Mistral-7B-v0.1) on the CIDDS dataset.
107
  It achieves the following results on the evaluation set:
108
  - Loss: 0.1465
109
 
110
+ # Mistral based NIDS
111
 
112
+ This repository contains an implementation of a Network Intrusion Detection System (NIDS) based on the Mistral Large Language Model (LLM). The system is designed to detect and classify network attacks using natural language processing techniques.
113
 
114
+ ## Overview
115
+ - **LLM**:
116
+ - The NIDS is built using the Mistral LLM, a powerful language model that enables the system to understand and analyze network traffic logs.
117
+ - Another LLM, Llama2, was fine-tuned and the performance of the two were compared. The link to my implementation of Llama2-based can be found [here](https://huggingface.co/caffeinatedcherrychic/Llama2-based-NIDS).
118
+ - **Dataset**: The system is trained and evaluated on the CIDDS dataset, which includes various types of network attacks such as DoS, PortScan, Brute Force, and PingScan.
119
+ - **Training**: The LLM is fine-tuned on the CIDDS dataset after it was pre-processed using the [NTFA tool](https://github.com/KayvanKarim/ntfa) to learn the patterns and characteristics of different network attacks.
120
+ - **Inference**: The trained model is used to classify network traffic logs in real-time, identifying potential attacks and generating alerts.
121
 
122
+ ## Results
123
+ The mistral-based NIDS achieves a higher detection rate with lower false positives, demonstrating the effectiveness of using LLMs for network intrusion detection. With access to computational resources for longer periods, It's performance could further be improved.
 
 
 
 
 
124
 
125
  ### Training hyperparameters
126