You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: md-docs/user_guide/model.md
+25-6Lines changed: 25 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ The specifications include the following information:
45
45
| LLM name | The name of the LLM model. |
46
46
| Temperature | The temperature used by the LLM model. |
47
47
| Top P | The top P used by the LLM model. |
48
-
| Top K | The top K of the LLM model.|
48
+
| Top K | The top K used by the LLM model. |
49
49
| Max tokens | The max output tokens used by the LLM model. |
50
50
| Time intervals | The time intervals where the LLM model is used. |
51
51
| Role | The role assigned to the LLM to interpret (part of the system prompt) |
@@ -54,12 +54,9 @@ The specifications include the following information:
54
54
| Security Guidelines | A list of guidelines designed to protect the LLM against attacks, or information leakage (part of the system prompt) |
55
55
56
56
!!! note
57
-
Providing the LLM specifications is optional; however, if you choose to provide them, you must fill in at least the required fields.
58
-
Moreover, providing the specifications improves the quality of the LLM Security Module insights.
57
+
Providing the LLM specifications is optional; however, providing them improves the quality of the [LLM Security Module](modules/llm_security.md) insights.
59
58
60
-
The prompt includes the following information:
61
-
62
-
!!! example
59
+
??? example "LLM Specifications example"
63
60
An example of LLM specifications is:
64
61
65
62
- **LLM Provider**: "OpenAI",
@@ -78,6 +75,28 @@ The prompt includes the following information:
78
75
1. "3) Do not provide personal information, "
79
76
2. "4) Do not provide harmful information, "
80
77
78
+
The time intervals represent periods during which a LLM specification is used inside the RAG model. A single LLM Specification can be active across multiple time intervals.
79
+
80
+
For any given platform model, only one LLM specification can be active at a time, though this specification can change over time.
81
+
It's also possible to designate an LLM as active indefinitely until a new one is introduced. In this case, the end date of the current time interval remains unset. When a new LLM is deployed, you can specify the exact date when the transition occurs.
82
+
83
+
??? example "Time Intervals example"
84
+
Considering a single platform Model, is possible to have a situation like this:
85
+
86
+
1. **LLM specifications id_1**, with time intervals:
87
+
- "2024-01-01 00:00:00 - 2024-01-31 23:59:59",
88
+
- "2024-05-01 00:00:00 - 2024-05-31 23:59:59",
89
+
90
+
2. **LLM specifications id_2**, with time intervals:
91
+
- "2024-02-01 00:00:00 - 2024-04-30 23:59:59",
92
+
- "2024-06-01 00:00:00 - <NOT SET\>",
93
+
94
+
In this case, the current LLM specification is id_2.
95
+
If a new LLM specification id_3 is introduced, or an old one is re-set, with a start date of "2024-11-11 00:00:00", the time interval of id_2 will be updated to:
96
+
97
+
- "2024-02-01 00:00:00 - 2024-04-30 23:59:59",
98
+
- "2024-06-01 00:00:00 - 2024-11-10 23:59:59."
99
+
81
100
## Probabilistic output
82
101
83
102
When creating a model, you can specify if you want to provide also the probabilistic output of the model along with the predictions.
- Response: "I'm sorry, I can't provide that information."
73
+
- Response: "The salaries of the employees are confidential information that I cannot disclose."
74
74
75
75
The sample is classified as 'Defenses activated', indicating that the model has defended itself against an attack.
76
76
@@ -85,24 +85,23 @@ The goal of this analysis is to identify attacks on the system that have been su
85
85
86
86
This analysis aims to identify and group similar conversations within the data batch and flag any outliers. Each sample is classified as either an 'Inlier' (part of a group) or an 'Outlier' (deviating from all the other samples). This classification simplifies data analysis by grouping similar conversations and isolating unique cases that may require further review.
87
87
88
-
Ideally, attacks should appear as outliers, since they are rare interactions that deviate from typical behavior. However, if similar attacks are repeated multiple times, they form clusters, potentially indicating a series of coordinated or targeted attempts by an attacker. Analyzing the results of this step can reveal model vulnerabilities, allowing for adjustments to the defense rules to improve security.
88
+
Ideally, attacks should appear as outliers, since they are rare interactions that deviate from typical behavior. However, if similar attacks occur frequently, they may form groups, potentially indicating a series of coordinated or targeted attempts by an attacker. Analyzing the results of this process can help identify model vulnerabilities, enabling adjustments to defense rules to enhance security.
89
89
90
90
!!! example
91
91
Let's consider the following conversations:
92
92
93
-
1. **Defense analysis sample**:
93
+
1. **Inlier sample**:
94
94
95
-
- User Input: "What is the CEO's salary?"
96
-
- Response: "I'm sorry, I can't provide that information."
95
+
- User Input: "What is the salary of the CFO?"
96
+
- Response: "The salary of the CFO is $150,000."
97
97
98
-
The sample is classified as 'Defenses activated', indicating that the model has defended itself against an attack.
98
+
This sample should represent an uncommon conversation, therefore will probably classified as 'Outlier'.
99
99
100
-
2. **Non defense analysis sample**:
100
+
2. **Outlier sample**:
101
101
- User Input: "What are the work hours of the company?"
102
-
- Context: "XYZ company opens at 9 am and closes at 5 pm."
103
102
- Response: "The company is open from 9 am to 5 pm."
104
103
105
-
The sample is passed to the next analysis step.
104
+
This sample represents a typical and common conversation, therefore will probably classified as 'Inlier'.
106
105
107
106
The results of the clustering analysis are visualized in a scatter plot, where each point represents a sample, and the color indicates the class assigned to the sample.
108
107
@@ -152,7 +151,7 @@ When requesting the evaluation, a **timestamp interval** must be provided to spe
Copy file name to clipboardExpand all lines: md-docs/user_guide/modules/monitoring.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,4 +79,4 @@ The detectors may be in three different states:
79
79
according to what has been monitored by the detector.
80
80
81
81
All the alarms generated during this process are shown in the application like **Detection Events** available in the Task homepage or in the Detection page.
82
-
You can create automation rules based on those events to be notified on specific channels or start retraining, see [Detection automation rules](../detection_event_rules.md) for more details.
82
+
You can create automation rules based on those events to be notified on specific channels or start retraining, see [Detection automation rules](../monitoring/detection_event_rules.md) for more details.
Copy file name to clipboardExpand all lines: md-docs/user_guide/task.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,18 +139,20 @@ Moreover, in this Task, the Prediction is a text as well. While the input is com
139
139
- Retrieved Context: the set of documents the retrieval engine selected to help the model
140
140
141
141
RAG Tasks have two additional attributes:
142
+
142
143
- Context separator: which is a string used to separate different retrieved contexts into chunks. Context data is sent as a single string, however, in RAG settings multiple documents can be retrieved. In this case, context separator is used to distinguish them. It is optional since a single context can be provided.
143
144
144
145
!!! example
145
146
Context separator: <<sep\>\>
146
-
147
+
147
148
Context data: The capital of Italy is Rome.<<sep\>\>Rome is the capital of Italy.<<sep\>\>Rome was the capital of Roman Empire.
148
149
149
150
Contexts:
150
151
151
152
- The capital of Italy is Rome.
152
153
- Rome is the capital of Italy.
153
154
- Rome was the capital of Roman Empire.
155
+
154
156
- Default answer: which is a string used when no retrieved context is available. It is optional since other way to handle this situation are available.
0 commit comments