File size: 6,338 Bytes
e144303
8675092
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
e144303
8675092
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
---
license: mit
task_categories:
  - text-generation
  - text-classification
  - question-answering
language:
  - en
tags:
  - cybersecurity
  - vulnerability
  - cve
  - mitre-attack
  - threat-intelligence
  - security
  - nvd
  - cisa-kev
  - infosec
size_categories:
  - 1K<n<10K
pretty_name: Cyber Threat Intelligence Dataset
---

# Cyber Threat Intelligence Dataset

> A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research.

**Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)  
**License:** MIT  
**Created:** 2026

---

## Dataset Description

This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:

1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring
2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods
3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild

Each CVE record is enriched with:
- CVSS v3.1 base scores and detailed metrics
- Attack type classification (mapped from CWE)
- MITRE ATT&CK tactic mapping
- Custom risk scoring (0-100)
- CISA KEV status (actively exploited or not)
- Ransomware usage indicators

Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts.

---

## Dataset Structure

### Configurations

| Split | Description | Rows |
|-------|-------------|------|
| `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
| `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 |
| `train` | Instruction-tuning training split | ~15000 |
| `test` | Instruction-tuning evaluation split | ~1500 |

### CVE Data Schema

| Column | Type | Description |
|--------|------|-------------|
| `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) |
| `description` | string | Vulnerability description |
| `cvss_score` | float | CVSS v3.1 base score (0-10) |
| `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW |
| `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
| `attack_complexity` | string | LOW / HIGH |
| `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
| `cwe_ids` | string | CWE weakness identifiers |
| `risk_score` | float | Custom composite risk score (0-100) |
| `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
| `exploit_available` | bool | Whether public exploits exist |
| `in_cisa_kev` | bool | Whether listed in CISA KEV catalog |
| `ransomware_use` | string | Known ransomware campaign usage |
| `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic |
| `affected_products` | string | Vendor/product affected |

### Instruction Data Schema

| Column | Type | Description |
|--------|------|-------------|
| `instruction` | string | The task instruction |
| `input` | string | CVE or technique context |
| `output` | string | Detailed expert analysis |

**Instruction types include:**
- CVE vulnerability analysis
- Remediation recommendations
- Risk scoring assessments
- MITRE ATT&CK mapping
- Triage prioritization decisions
- MITRE technique explanations

---

## Usage

### Load the Dataset

```python
from datasets import load_dataset

# Load all splits
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")

# Access CVE data
cve_data = dataset["cve_data"]
print(f"Total CVEs: {len(cve_data)}")
print(cve_data[0])

# Access MITRE techniques
mitre = dataset["mitre_attack"]
print(f"Total techniques: {len(mitre)}")

# Access training data
train = dataset["train"]
print(f"Training samples: {len(train)}")
print(train[0]["instruction"])
```

### Filter Critical Vulnerabilities

```python
critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
print(f"Critical CVEs: {len(critical_cves)}")
```

### Get Actively Exploited CVEs

```python
exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
print(f"Actively exploited CVEs: {len(exploited)}")
```

### Use for Fine-Tuning

```python
# Ready-to-use instruction format
for sample in dataset["train"]:
    instruction = sample["instruction"]
    input_text = sample["input"]
    output = sample["output"]
    # Format for your model and train!
```

---

## Data Sources

| Source | URL | License |
|--------|-----|---------|
| NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
| MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
| CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |

All data is collected from publicly available, free government and community sources.

---

## Intended Uses

- **Fine-tuning LLMs** for cybersecurity analysis tasks
- **Training classifiers** for vulnerability severity prediction
- **Building RAG systems** for security knowledge retrieval
- **Research** on automated vulnerability assessment
- **Education** on cybersecurity threat intelligence

## Limitations

- CVE descriptions are sourced from NVD and may not reflect the latest updates
- Risk scores are computed using a custom formula and may differ from organizational assessments
- MITRE ATT&CK mappings from CWE are approximate and based on common associations
- The instruction-tuning data is synthetically generated from structured fields

---

## About the Author

**Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.

- **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
- **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
- **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI)
- **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
- **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)

---

## Citation

```bibtex
@dataset{dahivalkar2026cyberthreat,
  author = {Dahivalkar, Soham},
  title = {Cyber Threat Intelligence Dataset},
  year = {2026},
  publisher = {HuggingFace},
  url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
}
```