Shomi28's picture
Add dataset card
8675092 verified
---
license: mit
task_categories:
- text-generation
- text-classification
- question-answering
language:
- en
tags:
- cybersecurity
- vulnerability
- cve
- mitre-attack
- threat-intelligence
- security
- nvd
- cisa-kev
- infosec
size_categories:
- 1K<n<10K
pretty_name: Cyber Threat Intelligence Dataset
---
# Cyber Threat Intelligence Dataset
> A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research.
**Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
**License:** MIT
**Created:** 2026
---
## Dataset Description
This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:
1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring
2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods
3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild
Each CVE record is enriched with:
- CVSS v3.1 base scores and detailed metrics
- Attack type classification (mapped from CWE)
- MITRE ATT&CK tactic mapping
- Custom risk scoring (0-100)
- CISA KEV status (actively exploited or not)
- Ransomware usage indicators
Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts.
---
## Dataset Structure
### Configurations
| Split | Description | Rows |
|-------|-------------|------|
| `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
| `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 |
| `train` | Instruction-tuning training split | ~15000 |
| `test` | Instruction-tuning evaluation split | ~1500 |
### CVE Data Schema
| Column | Type | Description |
|--------|------|-------------|
| `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) |
| `description` | string | Vulnerability description |
| `cvss_score` | float | CVSS v3.1 base score (0-10) |
| `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW |
| `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
| `attack_complexity` | string | LOW / HIGH |
| `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
| `cwe_ids` | string | CWE weakness identifiers |
| `risk_score` | float | Custom composite risk score (0-100) |
| `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
| `exploit_available` | bool | Whether public exploits exist |
| `in_cisa_kev` | bool | Whether listed in CISA KEV catalog |
| `ransomware_use` | string | Known ransomware campaign usage |
| `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic |
| `affected_products` | string | Vendor/product affected |
### Instruction Data Schema
| Column | Type | Description |
|--------|------|-------------|
| `instruction` | string | The task instruction |
| `input` | string | CVE or technique context |
| `output` | string | Detailed expert analysis |
**Instruction types include:**
- CVE vulnerability analysis
- Remediation recommendations
- Risk scoring assessments
- MITRE ATT&CK mapping
- Triage prioritization decisions
- MITRE technique explanations
---
## Usage
### Load the Dataset
```python
from datasets import load_dataset
# Load all splits
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")
# Access CVE data
cve_data = dataset["cve_data"]
print(f"Total CVEs: {len(cve_data)}")
print(cve_data[0])
# Access MITRE techniques
mitre = dataset["mitre_attack"]
print(f"Total techniques: {len(mitre)}")
# Access training data
train = dataset["train"]
print(f"Training samples: {len(train)}")
print(train[0]["instruction"])
```
### Filter Critical Vulnerabilities
```python
critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
print(f"Critical CVEs: {len(critical_cves)}")
```
### Get Actively Exploited CVEs
```python
exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
print(f"Actively exploited CVEs: {len(exploited)}")
```
### Use for Fine-Tuning
```python
# Ready-to-use instruction format
for sample in dataset["train"]:
instruction = sample["instruction"]
input_text = sample["input"]
output = sample["output"]
# Format for your model and train!
```
---
## Data Sources
| Source | URL | License |
|--------|-----|---------|
| NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
| MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
| CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |
All data is collected from publicly available, free government and community sources.
---
## Intended Uses
- **Fine-tuning LLMs** for cybersecurity analysis tasks
- **Training classifiers** for vulnerability severity prediction
- **Building RAG systems** for security knowledge retrieval
- **Research** on automated vulnerability assessment
- **Education** on cybersecurity threat intelligence
## Limitations
- CVE descriptions are sourced from NVD and may not reflect the latest updates
- Risk scores are computed using a custom formula and may differ from organizational assessments
- MITRE ATT&CK mappings from CWE are approximate and based on common associations
- The instruction-tuning data is synthetically generated from structured fields
---
## About the Author
**Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.
- **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
- **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
- **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI)
- **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
- **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
---
## Citation
```bibtex
@dataset{dahivalkar2026cyberthreat,
author = {Dahivalkar, Soham},
title = {Cyber Threat Intelligence Dataset},
year = {2026},
publisher = {HuggingFace},
url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
}
```