Wyatt Roersma commited on
Commit
d144846
1 Parent(s): 476dd7c

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +67 -133
README.md CHANGED
@@ -3,200 +3,134 @@ base_model: meta-llama/Meta-Llama-3.1-8B-Instruct
3
  library_name: peft
4
  ---
5
 
6
- # Model Card for Model ID
7
-
8
- <!-- Provide a quick summary of what the model is/does. -->
9
-
10
 
 
11
 
12
  ## Model Details
13
 
14
  ### Model Description
15
 
16
- <!-- Provide a longer summary of what this model is. -->
17
-
18
-
19
 
20
- - **Developed by:** [More Information Needed]
21
- - **Funded by [optional]:** [More Information Needed]
22
- - **Shared by [optional]:** [More Information Needed]
23
- - **Model type:** [More Information Needed]
24
- - **Language(s) (NLP):** [More Information Needed]
25
- - **License:** [More Information Needed]
26
- - **Finetuned from model [optional]:** [More Information Needed]
27
 
28
  ### Model Sources [optional]
29
 
30
- <!-- Provide the basic links for the model. -->
31
-
32
- - **Repository:** [More Information Needed]
33
- - **Paper [optional]:** [More Information Needed]
34
- - **Demo [optional]:** [More Information Needed]
35
 
36
  ## Uses
37
 
38
- <!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
39
-
40
  ### Direct Use
41
 
42
- <!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
43
-
44
- [More Information Needed]
45
-
46
- ### Downstream Use [optional]
47
-
48
- <!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
49
-
50
- [More Information Needed]
51
 
52
  ### Out-of-Scope Use
53
 
54
- <!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
55
-
56
- [More Information Needed]
 
57
 
58
  ## Bias, Risks, and Limitations
59
 
60
- <!-- This section is meant to convey both technical and sociotechnical limitations. -->
61
-
62
- [More Information Needed]
63
 
64
  ### Recommendations
65
 
66
- <!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
67
-
68
- Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
69
 
70
  ## How to Get Started with the Model
71
 
72
- Use the code below to get started with the model.
73
-
74
- [More Information Needed]
75
 
76
- ## Training Details
77
-
78
- ### Training Data
79
 
80
- <!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
 
 
 
 
81
 
82
- [More Information Needed]
 
83
 
84
- ### Training Procedure
 
 
 
 
 
85
 
86
- <!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
87
 
88
- #### Preprocessing [optional]
89
 
90
- [More Information Needed]
91
 
 
92
 
93
  #### Training Hyperparameters
94
 
95
- - **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
96
-
97
- #### Speeds, Sizes, Times [optional]
98
-
99
- <!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
100
-
101
- [More Information Needed]
102
 
103
  ## Evaluation
104
 
105
- <!-- This section describes the evaluation protocols and provides the results. -->
106
-
107
- ### Testing Data, Factors & Metrics
108
-
109
- #### Testing Data
110
-
111
- <!-- This should link to a Dataset Card if possible. -->
112
-
113
- [More Information Needed]
114
-
115
- #### Factors
116
-
117
- <!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
118
-
119
- [More Information Needed]
120
-
121
- #### Metrics
122
-
123
- <!-- These are the evaluation metrics being used, ideally with a description of why. -->
124
-
125
- [More Information Needed]
126
-
127
- ### Results
128
-
129
- [More Information Needed]
130
-
131
- #### Summary
132
-
133
-
134
-
135
- ## Model Examination [optional]
136
-
137
- <!-- Relevant interpretability work for the model goes here -->
138
-
139
- [More Information Needed]
140
-
141
  ## Environmental Impact
142
 
143
- <!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
144
-
145
- Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
146
 
147
- - **Hardware Type:** [More Information Needed]
148
- - **Hours used:** [More Information Needed]
149
- - **Cloud Provider:** [More Information Needed]
150
- - **Compute Region:** [More Information Needed]
151
- - **Carbon Emitted:** [More Information Needed]
152
 
153
  ## Technical Specifications [optional]
154
 
155
  ### Model Architecture and Objective
156
 
157
- [More Information Needed]
158
 
159
  ### Compute Infrastructure
160
 
161
- [More Information Needed]
162
-
163
  #### Hardware
164
 
165
- [More Information Needed]
166
 
167
  #### Software
168
 
169
- [More Information Needed]
170
-
171
- ## Citation [optional]
172
-
173
- <!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
174
-
175
- **BibTeX:**
176
-
177
- [More Information Needed]
178
-
179
- **APA:**
180
-
181
- [More Information Needed]
182
-
183
- ## Glossary [optional]
184
-
185
- <!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
186
-
187
- [More Information Needed]
188
-
189
- ## More Information [optional]
190
-
191
- [More Information Needed]
192
 
193
  ## Model Card Authors [optional]
194
 
195
- [More Information Needed]
196
 
197
  ## Model Card Contact
198
 
199
- [More Information Needed]
200
- ### Framework versions
201
 
202
- - PEFT 0.12.0
 
 
3
  library_name: peft
4
  ---
5
 
6
+ # Model Card for LLaMA 3.1 8B Instruct - Cybersecurity Fine-tuned
 
 
 
7
 
8
+ This model is a fine-tuned version of the LLaMA 3.1 8B Instruct model, specifically adapted for cybersecurity-related tasks.
9
 
10
  ## Model Details
11
 
12
  ### Model Description
13
 
14
+ This model is based on the LLaMA 3.1 8B Instruct model and has been fine-tuned on a custom dataset of cybersecurity-related questions and answers. It is designed to provide more accurate and relevant responses to queries in the cybersecurity domain.
 
 
15
 
16
+ - **Developed by:** [Your Name/Organization]
17
+ - **Model type:** Instruct-tuned Large Language Model
18
+ - **Language(s) (NLP):** English (primary), with potential for limited multilingual capabilities
19
+ - **License:** [Specify the license, likely related to the original LLaMA 3.1 license]
20
+ - **Finetuned from model:** meta-llama/Meta-Llama-3.1-8B-Instruct
 
 
21
 
22
  ### Model Sources [optional]
23
 
24
+ - **Repository:** [Link to your Hugging Face repository]
25
+ - **Paper [optional]:** [If you've written a paper about this fine-tuning, link it here]
26
+ - **Demo [optional]:** [If you have a demo of the model, link it here]
 
 
27
 
28
  ## Uses
29
 
 
 
30
  ### Direct Use
31
 
32
+ This model can be used for a variety of cybersecurity-related tasks, including:
33
+ - Answering questions about cybersecurity concepts and practices
34
+ - Providing explanations of cybersecurity threats and vulnerabilities
35
+ - Assisting in the interpretation of security logs and indicators of compromise
36
+ - Offering guidance on best practices for cyber defense
 
 
 
 
37
 
38
  ### Out-of-Scope Use
39
 
40
+ This model should not be used for:
41
+ - Generating or assisting in the creation of malicious code
42
+ - Providing legal or professional security advice without expert oversight
43
+ - Making critical security decisions without human verification
44
 
45
  ## Bias, Risks, and Limitations
46
 
47
+ - The model may reflect biases present in its training data and the original LLaMA 3.1 model.
48
+ - It may occasionally generate incorrect or inconsistent information, especially for very specific or novel cybersecurity topics.
49
+ - The model's knowledge is limited to its training data cutoff and does not include real-time threat intelligence.
50
 
51
  ### Recommendations
52
 
53
+ Users should verify critical information and consult with cybersecurity professionals for important decisions. The model should be used as an assistant tool, not as a replacement for expert knowledge or up-to-date threat intelligence.
 
 
54
 
55
  ## How to Get Started with the Model
56
 
57
+ Use the following code to get started with the model:
 
 
58
 
59
+ ```python
60
+ from transformers import AutoTokenizer, AutoModelForCausalLM
61
+ from peft import PeftModel, PeftConfig
62
 
63
+ # Load the model
64
+ model_name = "your-username/llama3-cybersecurity"
65
+ config = PeftConfig.from_pretrained(model_name)
66
+ model = AutoModelForCausalLM.from_pretrained(config.base_model_name_or_path)
67
+ model = PeftModel.from_pretrained(model, model_name)
68
 
69
+ # Load the tokenizer
70
+ tokenizer = AutoTokenizer.from_pretrained(config.base_model_name_or_path)
71
 
72
+ # Example usage
73
+ prompt = "What are some common indicators of a ransomware attack?"
74
+ inputs = tokenizer(prompt, return_tensors="pt")
75
+ outputs = model.generate(**inputs, max_length=200)
76
+ print(tokenizer.decode(outputs[0], skip_special_tokens=True))
77
+ ```
78
 
79
+ ## Training Details
80
 
81
+ ### Training Data
82
 
83
+ The model was fine-tuned on a custom dataset of cybersecurity-related questions and answers. [Add more details about your dataset here]
84
 
85
+ ### Training Procedure
86
 
87
  #### Training Hyperparameters
88
 
89
+ - **Training regime:** bf16 mixed precision
90
+ - **Optimizer:** AdamW
91
+ - **Learning rate:** 5e-5
92
+ - **Batch size:** 4
93
+ - **Gradient accumulation steps:** 4
94
+ - **Epochs:** 5
95
+ - **Max steps:** 4000
96
 
97
  ## Evaluation
98
 
99
+ I used a custom yara evulation
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
100
  ## Environmental Impact
101
 
102
+ - **Hardware Type:** NVIDIA A100
103
+ - **Hours used:** 12 Hours
104
+ - **Cloud Provider:** vast.io
105
 
 
 
 
 
 
106
 
107
  ## Technical Specifications [optional]
108
 
109
  ### Model Architecture and Objective
110
 
111
+ This model uses the LLaMA 3.1 8B architecture with additional LoRA adapters for fine-tuning. It was trained using a causal language modeling objective on cybersecurity-specific data.
112
 
113
  ### Compute Infrastructure
114
 
 
 
115
  #### Hardware
116
 
117
+ "Single NVIDIA A100 GPU"
118
 
119
  #### Software
120
 
121
+ - Python 3.8+
122
+ - PyTorch 2.0+
123
+ - Transformers 4.28+
124
+ - PEFT 0.12.0
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
125
 
126
  ## Model Card Authors [optional]
127
 
128
+ Wyatt Roersma
129
 
130
  ## Model Card Contact
131
 
132
+ Email me at [email protected] with questions.
133
+ ```
134
 
135
+ This README.md provides a comprehensive overview of your fine-tuned model, including its purpose, capabilities, limitations, and technical details. You should replace the placeholder text (like "[Your Name/Organization]") with the appropriate information. Additionally, you may want to expand on certain sections, such as the evaluation metrics and results, if you have more specific data available from your fine-tuning process.
136
+ </answer>