Nyameri commited on
Commit
e4b558e
1 Parent(s): 8c3f9b2

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +167 -0
README.md CHANGED
@@ -1,3 +1,170 @@
1
  ---
2
  license: mit
 
 
 
 
 
 
3
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
  license: mit
3
+ task_categories:
4
+ - summarization
5
+ - feature-extraction
6
+ pretty_name: AI threat Hunter's playbook
7
+ size_categories:
8
+ - 1K<n<10K
9
  ---
10
+ # Dataset Card for Dataset Name
11
+
12
+ <!-- AI XDR playbook -->
13
+
14
+ This dataset card aims to be a base template for new datasets. It has been generated using [this raw template](https://github.com/huggingface/huggingface_hub/blob/main/src/huggingface_hub/templates/datasetcard_template.md?plain=1).
15
+
16
+ ## Dataset Details
17
+
18
+ ### Dataset Description
19
+
20
+ <!-- AI xdr paper
21
+
22
+ XDR (Extended Detection and Response) is a security solution that combines multiple detection and response technologies to provide a more comprehensive view of an organization's security posture, making it easier to recognize and respond to potential threats[1]. AI/ML (Artificial Intelligence/Machine Learning) is a key component of XDR, as it enables advanced analytics techniques to identify potential threats and automate response actions[1][2]. Here are some ways in which AI enhances XDR platforms:
23
+
24
+ - **Advanced analytics**: XDR solutions use advanced analytics techniques supported by machine learning (ML) models to identify potential threats and automate response actions[1][5].
25
+
26
+ - **Automated response**: XDR solutions can automatically block or quarantine malicious files and alert security teams to potential incidents[1].
27
+
28
+ - **Single pane of glass view**: XDR solutions provide a unified view of all security events and incidents, making it easier for security teams to investigate and respond to threats[1].
29
+
30
+ - **Detecting unknown or zero-day threats**: AI-powered XDR solutions can detect unknown or zero-day threats, making them more effective than traditional detection and response technologies that rely on rule-based or signature-based detection methods[1][5].
31
+
32
+ - **Predicting future cyberattacks**: AI is able to predict future cyberattacks and identify their mechanisms to determine their origin, accelerating responses to attacks[5].
33
+
34
+ XDR platforms with AI can perform analyses on every layer of an organization's infrastructure, including those that were previously inaccessible to analysts[5]. AI analyzes logs and compares current activities on an organization's infrastructure to detect any unusual action on all its infrastructures, including servers, workstations, and networks[5]. Additionally, an AI-powered XDR with Next Generation Antivirus (NGAV) can detect unknown malicious files[5]. If an anomaly is detected, the sensors immediately send the information back to the XDR, which can automatically prioritize alerts so that security teams can immediately respond to potential threats[5].
35
+
36
+ Citations:
37
+ [1] Machine Learning and Artificial Intelligence (AI/ML): The Secret Sauce Behind XDR https://www.computer.org/publications/tech-news/trends/the-secret-sauce-behind-xdr/
38
+ [2] AI-Driven XDR: Defeating the Most Complex Attack Sequences - Cybereason https://www.cybereason.com/blog/ai-driven-xdr-defeating-the-most-complex-attack-sequences
39
+ [3] Harnessing the Power of AI-Driven XDR - Cybereason https://www.cybereason.com/blog/harnessing-the-power-of-ai-driven-xdr
40
+ [4] Explainable dimensionality reduction (XDR) to unbox AI 'black box' models: A study of AI perspectives on the ethnic styles of village dwellings - Nature https://www.nature.com/articles/s41599-023-01505-4
41
+ [5] How does AI enhance XDR platforms? - TEHTRIS https://tehtris.com/en/blog/how-does-ai-enhance-xdr-platforms
42
+ [6] XDR Should Be Viewed as An Open Architecture - Vectra AI https://www.vectra.ai/resources/research-reports/esg-xdr-open-architecture
43
+
44
+ By Perplexity at https://www.perplexity.ai/search/fd37ce22-dccf-4aa9-8478-d24cf6db23c4?s=m -->
45
+
46
+
47
+
48
+ - **Curated by:** [Edward Nyameri ]
49
+ - **Funded by [optional]:** [Nil funding but any interested POC is welcome]
50
+ - **Shared by [optional]:** [Edward Nyameri ]
51
+ - **Language(s) (NLP):** [LLM]
52
+ - **License:** [MIT]
53
+
54
+ ### Dataset Sources [optional]
55
+
56
+ <!-- schooly-Computer Breaches -->
57
+
58
+ - **Repository:** [More Information Needed]
59
+ - **Paper [optional]:** [More Information Needed]
60
+ - **Demo [optional]:** [More Information Needed]
61
+
62
+ ## Uses
63
+
64
+ <!-- Threat Hunting for AI cyber Security Tool Kit -->
65
+
66
+ ### Direct Use
67
+
68
+ <!-- application platform analysis for Threat Hunters-->
69
+
70
+ [More Information Needed]
71
+
72
+ ### Out-of-Scope Use
73
+
74
+ <!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
75
+
76
+ [More Information Needed]
77
+
78
+ ## Dataset Structure
79
+
80
+ <!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
81
+
82
+ [More Information Needed]
83
+
84
+ ## Dataset Creation
85
+
86
+ ### Curation Rationale
87
+
88
+ <!-- Advancement of the Threat Hunt using Computational Intelligence to curb & contain comprising of information -->
89
+
90
+ [More Information Needed]
91
+
92
+ ### Source Data
93
+
94
+ <!-- 🏫 Computer Breaches-->
95
+
96
+ #### Data Collection and Processing
97
+
98
+ <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
99
+
100
+ [More Information Needed]
101
+
102
+ #### Who are the source data producers?
103
+
104
+ <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
105
+
106
+ [More Information Needed]
107
+
108
+ ### Annotations [optional]
109
+
110
+ <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
111
+
112
+ #### Annotation process
113
+
114
+ <!-- This section describes the annotation process such as annotation tools used in the process, the amount of data annotated, annotation guidelines provided to the annotators, interannotator statistics, annotation validation, etc. -->
115
+
116
+ [More Information Needed]
117
+
118
+ #### Who are the annotators?
119
+
120
+ <!-- This section describes the people or systems who created the annotations. -->
121
+
122
+ [More Information Needed]
123
+
124
+ #### Personal and Sensitive Information
125
+
126
+ <!-- State whether the dataset contains data that might be considered personal, sensitive, or private (e.g., data that reveals addresses, uniquely identifiable names or aliases, racial or ethnic origins, sexual orientations, religious beliefs, political opinions, financial or health data, etc.). If efforts were made to anonymize the data, describe the anonymization process. -->
127
+
128
+ [More Information Needed]
129
+
130
+ ## Bias, Risks, and Limitations
131
+
132
+ <!-- This section is meant to convey both technical and sociotechnical limitations. -->
133
+
134
+ [More Information Needed]
135
+
136
+ ### Recommendations
137
+
138
+ <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
139
+
140
+ Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
141
+
142
+ ## Citation [optional]
143
+
144
+ <!-- If there is a paper or blog post introducing the dataset, the APA and Bibtex information for that should go in this section. -->
145
+
146
+ **BibTeX:**
147
+
148
+ [More Information Needed]
149
+
150
+ **APA:**
151
+
152
+ [More Information Needed]
153
+
154
+ ## Glossary [optional]
155
+
156
+ <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
157
+
158
+ [More Information Needed]
159
+
160
+ ## More Information [optional]
161
+
162
+ [More Information Needed]
163
+
164
+ ## Dataset Card Authors [optional]
165
+
166
+ [More Information Needed]
167
+
168
+ ## Dataset Card Contact
169
+
170
+ [More Information Needed]