Update README.md
Browse files
README.md
CHANGED
@@ -9,7 +9,7 @@ The fine-tuning was conducted using a curated corpus of 950 cybersecurity rules
|
|
9 |
|
10 |
Instruct the model to craft a SIGMA rule for detecting potentially malicious commands such as `msfvenom` and `netcat` in Audit system logs, or a Suricata rule to spot SSH brute-force attacks, or even a YARA rule to identify obfuscated strings in files — and watch the magic happen! Automate the creation of rules in your cybersecurity systems with this model.
|
11 |
|
12 |
-
For an in-depth understanding of how this model has been fine-tuned, refer to the associated paper here: [
|
13 |
|
14 |
|
15 |
## Key Features
|
|
|
9 |
|
10 |
Instruct the model to craft a SIGMA rule for detecting potentially malicious commands such as `msfvenom` and `netcat` in Audit system logs, or a Suricata rule to spot SSH brute-force attacks, or even a YARA rule to identify obfuscated strings in files — and watch the magic happen! Automate the creation of rules in your cybersecurity systems with this model.
|
11 |
|
12 |
+
For an in-depth understanding of how this model has been fine-tuned, refer to the associated paper here: [available soon].
|
13 |
|
14 |
|
15 |
## Key Features
|