Datasets:
File size: 6,338 Bytes
e144303 8675092 e144303 8675092 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 | ---
license: mit
task_categories:
- text-generation
- text-classification
- question-answering
language:
- en
tags:
- cybersecurity
- vulnerability
- cve
- mitre-attack
- threat-intelligence
- security
- nvd
- cisa-kev
- infosec
size_categories:
- 1K<n<10K
pretty_name: Cyber Threat Intelligence Dataset
---
# Cyber Threat Intelligence Dataset
> A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research.
**Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
**License:** MIT
**Created:** 2026
---
## Dataset Description
This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:
1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring
2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods
3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild
Each CVE record is enriched with:
- CVSS v3.1 base scores and detailed metrics
- Attack type classification (mapped from CWE)
- MITRE ATT&CK tactic mapping
- Custom risk scoring (0-100)
- CISA KEV status (actively exploited or not)
- Ransomware usage indicators
Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts.
---
## Dataset Structure
### Configurations
| Split | Description | Rows |
|-------|-------------|------|
| `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
| `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 |
| `train` | Instruction-tuning training split | ~15000 |
| `test` | Instruction-tuning evaluation split | ~1500 |
### CVE Data Schema
| Column | Type | Description |
|--------|------|-------------|
| `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) |
| `description` | string | Vulnerability description |
| `cvss_score` | float | CVSS v3.1 base score (0-10) |
| `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW |
| `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
| `attack_complexity` | string | LOW / HIGH |
| `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
| `cwe_ids` | string | CWE weakness identifiers |
| `risk_score` | float | Custom composite risk score (0-100) |
| `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
| `exploit_available` | bool | Whether public exploits exist |
| `in_cisa_kev` | bool | Whether listed in CISA KEV catalog |
| `ransomware_use` | string | Known ransomware campaign usage |
| `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic |
| `affected_products` | string | Vendor/product affected |
### Instruction Data Schema
| Column | Type | Description |
|--------|------|-------------|
| `instruction` | string | The task instruction |
| `input` | string | CVE or technique context |
| `output` | string | Detailed expert analysis |
**Instruction types include:**
- CVE vulnerability analysis
- Remediation recommendations
- Risk scoring assessments
- MITRE ATT&CK mapping
- Triage prioritization decisions
- MITRE technique explanations
---
## Usage
### Load the Dataset
```python
from datasets import load_dataset
# Load all splits
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")
# Access CVE data
cve_data = dataset["cve_data"]
print(f"Total CVEs: {len(cve_data)}")
print(cve_data[0])
# Access MITRE techniques
mitre = dataset["mitre_attack"]
print(f"Total techniques: {len(mitre)}")
# Access training data
train = dataset["train"]
print(f"Training samples: {len(train)}")
print(train[0]["instruction"])
```
### Filter Critical Vulnerabilities
```python
critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
print(f"Critical CVEs: {len(critical_cves)}")
```
### Get Actively Exploited CVEs
```python
exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
print(f"Actively exploited CVEs: {len(exploited)}")
```
### Use for Fine-Tuning
```python
# Ready-to-use instruction format
for sample in dataset["train"]:
instruction = sample["instruction"]
input_text = sample["input"]
output = sample["output"]
# Format for your model and train!
```
---
## Data Sources
| Source | URL | License |
|--------|-----|---------|
| NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
| MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
| CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |
All data is collected from publicly available, free government and community sources.
---
## Intended Uses
- **Fine-tuning LLMs** for cybersecurity analysis tasks
- **Training classifiers** for vulnerability severity prediction
- **Building RAG systems** for security knowledge retrieval
- **Research** on automated vulnerability assessment
- **Education** on cybersecurity threat intelligence
## Limitations
- CVE descriptions are sourced from NVD and may not reflect the latest updates
- Risk scores are computed using a custom formula and may differ from organizational assessments
- MITRE ATT&CK mappings from CWE are approximate and based on common associations
- The instruction-tuning data is synthetically generated from structured fields
---
## About the Author
**Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.
- **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
- **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
- **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI)
- **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
- **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
---
## Citation
```bibtex
@dataset{dahivalkar2026cyberthreat,
author = {Dahivalkar, Soham},
title = {Cyber Threat Intelligence Dataset},
year = {2026},
publisher = {HuggingFace},
url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
}
```
|