Shomi28 commited on
Commit
8675092
·
verified ·
1 Parent(s): 805cab8

Add dataset card

Browse files
Files changed (1) hide show
  1. README.md +204 -127
README.md CHANGED
@@ -1,129 +1,206 @@
1
  ---
2
- dataset_info:
3
- - config_name: cve_data
4
- features:
5
- - name: cve_id
6
- dtype: string
7
- - name: description
8
- dtype: string
9
- - name: published_date
10
- dtype: string
11
- - name: last_modified
12
- dtype: string
13
- - name: cwe_ids
14
- dtype: string
15
- - name: affected_products
16
- dtype: string
17
- - name: reference_urls
18
- dtype: string
19
- - name: exploit_available
20
- dtype: string
21
- - name: cvss_score
22
- dtype: string
23
- - name: cvss_severity
24
- dtype: string
25
- - name: attack_vector
26
- dtype: string
27
- - name: attack_complexity
28
- dtype: string
29
- - name: privileges_required
30
- dtype: string
31
- - name: user_interaction
32
- dtype: string
33
- - name: scope
34
- dtype: string
35
- - name: confidentiality_impact
36
- dtype: string
37
- - name: integrity_impact
38
- dtype: string
39
- - name: availability_impact
40
- dtype: string
41
- - name: exploitability_score
42
- dtype: string
43
- - name: impact_score
44
- dtype: string
45
- - name: attack_type
46
- dtype: string
47
- - name: likely_mitre_tactic
48
- dtype: string
49
- - name: risk_score
50
- dtype: string
51
- - name: risk_level
52
- dtype: string
53
- - name: primary_vendor_product
54
- dtype: string
55
- - name: in_cisa_kev
56
- dtype: string
57
- - name: ransomware_use
58
- dtype: string
59
- - name: kev_required_action
60
- dtype: string
61
- splits:
62
- - name: train
63
- num_bytes: 4519629
64
- num_examples: 5000
65
- download_size: 1068547
66
- dataset_size: 4519629
67
- - config_name: instructions
68
- features:
69
- - name: instruction
70
- dtype: string
71
- - name: input
72
- dtype: string
73
- - name: output
74
- dtype: string
75
- splits:
76
- - name: train
77
- num_bytes: 14942525
78
- num_examples: 14189
79
- - name: test
80
- num_bytes: 1667748
81
- num_examples: 1577
82
- download_size: 3840922
83
- dataset_size: 16610273
84
- - config_name: mitre_attack
85
- features:
86
- - name: technique_id
87
- dtype: string
88
- - name: technique_name
89
- dtype: string
90
- - name: tactics
91
- dtype: string
92
- - name: description
93
- dtype: string
94
- - name: detection
95
- dtype: string
96
- - name: platforms
97
- dtype: string
98
- - name: data_sources
99
- dtype: string
100
- - name: is_subtechnique
101
- dtype: string
102
- - name: url
103
- dtype: string
104
- - name: created
105
- dtype: string
106
- - name: modified
107
- dtype: string
108
- splits:
109
- - name: train
110
- num_bytes: 820866
111
- num_examples: 697
112
- download_size: 386375
113
- dataset_size: 820866
114
- configs:
115
- - config_name: cve_data
116
- data_files:
117
- - split: train
118
- path: cve_data/train-*
119
- - config_name: instructions
120
- data_files:
121
- - split: train
122
- path: instructions/train-*
123
- - split: test
124
- path: instructions/test-*
125
- - config_name: mitre_attack
126
- data_files:
127
- - split: train
128
- path: mitre_attack/train-*
129
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
+ license: mit
3
+ task_categories:
4
+ - text-generation
5
+ - text-classification
6
+ - question-answering
7
+ language:
8
+ - en
9
+ tags:
10
+ - cybersecurity
11
+ - vulnerability
12
+ - cve
13
+ - mitre-attack
14
+ - threat-intelligence
15
+ - security
16
+ - nvd
17
+ - cisa-kev
18
+ - infosec
19
+ size_categories:
20
+ - 1K<n<10K
21
+ pretty_name: Cyber Threat Intelligence Dataset
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
22
  ---
23
+
24
+ # Cyber Threat Intelligence Dataset
25
+
26
+ > A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research.
27
+
28
+ **Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
29
+ **License:** MIT
30
+ **Created:** 2026
31
+
32
+ ---
33
+
34
+ ## Dataset Description
35
+
36
+ This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:
37
+
38
+ 1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring
39
+ 2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods
40
+ 3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild
41
+
42
+ Each CVE record is enriched with:
43
+ - CVSS v3.1 base scores and detailed metrics
44
+ - Attack type classification (mapped from CWE)
45
+ - MITRE ATT&CK tactic mapping
46
+ - Custom risk scoring (0-100)
47
+ - CISA KEV status (actively exploited or not)
48
+ - Ransomware usage indicators
49
+
50
+ Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts.
51
+
52
+ ---
53
+
54
+ ## Dataset Structure
55
+
56
+ ### Configurations
57
+
58
+ | Split | Description | Rows |
59
+ |-------|-------------|------|
60
+ | `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
61
+ | `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 |
62
+ | `train` | Instruction-tuning training split | ~15000 |
63
+ | `test` | Instruction-tuning evaluation split | ~1500 |
64
+
65
+ ### CVE Data Schema
66
+
67
+ | Column | Type | Description |
68
+ |--------|------|-------------|
69
+ | `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) |
70
+ | `description` | string | Vulnerability description |
71
+ | `cvss_score` | float | CVSS v3.1 base score (0-10) |
72
+ | `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW |
73
+ | `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
74
+ | `attack_complexity` | string | LOW / HIGH |
75
+ | `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
76
+ | `cwe_ids` | string | CWE weakness identifiers |
77
+ | `risk_score` | float | Custom composite risk score (0-100) |
78
+ | `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
79
+ | `exploit_available` | bool | Whether public exploits exist |
80
+ | `in_cisa_kev` | bool | Whether listed in CISA KEV catalog |
81
+ | `ransomware_use` | string | Known ransomware campaign usage |
82
+ | `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic |
83
+ | `affected_products` | string | Vendor/product affected |
84
+
85
+ ### Instruction Data Schema
86
+
87
+ | Column | Type | Description |
88
+ |--------|------|-------------|
89
+ | `instruction` | string | The task instruction |
90
+ | `input` | string | CVE or technique context |
91
+ | `output` | string | Detailed expert analysis |
92
+
93
+ **Instruction types include:**
94
+ - CVE vulnerability analysis
95
+ - Remediation recommendations
96
+ - Risk scoring assessments
97
+ - MITRE ATT&CK mapping
98
+ - Triage prioritization decisions
99
+ - MITRE technique explanations
100
+
101
+ ---
102
+
103
+ ## Usage
104
+
105
+ ### Load the Dataset
106
+
107
+ ```python
108
+ from datasets import load_dataset
109
+
110
+ # Load all splits
111
+ dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")
112
+
113
+ # Access CVE data
114
+ cve_data = dataset["cve_data"]
115
+ print(f"Total CVEs: {len(cve_data)}")
116
+ print(cve_data[0])
117
+
118
+ # Access MITRE techniques
119
+ mitre = dataset["mitre_attack"]
120
+ print(f"Total techniques: {len(mitre)}")
121
+
122
+ # Access training data
123
+ train = dataset["train"]
124
+ print(f"Training samples: {len(train)}")
125
+ print(train[0]["instruction"])
126
+ ```
127
+
128
+ ### Filter Critical Vulnerabilities
129
+
130
+ ```python
131
+ critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
132
+ print(f"Critical CVEs: {len(critical_cves)}")
133
+ ```
134
+
135
+ ### Get Actively Exploited CVEs
136
+
137
+ ```python
138
+ exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
139
+ print(f"Actively exploited CVEs: {len(exploited)}")
140
+ ```
141
+
142
+ ### Use for Fine-Tuning
143
+
144
+ ```python
145
+ # Ready-to-use instruction format
146
+ for sample in dataset["train"]:
147
+ instruction = sample["instruction"]
148
+ input_text = sample["input"]
149
+ output = sample["output"]
150
+ # Format for your model and train!
151
+ ```
152
+
153
+ ---
154
+
155
+ ## Data Sources
156
+
157
+ | Source | URL | License |
158
+ |--------|-----|---------|
159
+ | NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
160
+ | MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
161
+ | CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |
162
+
163
+ All data is collected from publicly available, free government and community sources.
164
+
165
+ ---
166
+
167
+ ## Intended Uses
168
+
169
+ - **Fine-tuning LLMs** for cybersecurity analysis tasks
170
+ - **Training classifiers** for vulnerability severity prediction
171
+ - **Building RAG systems** for security knowledge retrieval
172
+ - **Research** on automated vulnerability assessment
173
+ - **Education** on cybersecurity threat intelligence
174
+
175
+ ## Limitations
176
+
177
+ - CVE descriptions are sourced from NVD and may not reflect the latest updates
178
+ - Risk scores are computed using a custom formula and may differ from organizational assessments
179
+ - MITRE ATT&CK mappings from CWE are approximate and based on common associations
180
+ - The instruction-tuning data is synthetically generated from structured fields
181
+
182
+ ---
183
+
184
+ ## About the Author
185
+
186
+ **Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.
187
+
188
+ - **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
189
+ - **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
190
+ - **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI)
191
+ - **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
192
+ - **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
193
+
194
+ ---
195
+
196
+ ## Citation
197
+
198
+ ```bibtex
199
+ @dataset{dahivalkar2026cyberthreat,
200
+ author = {Dahivalkar, Soham},
201
+ title = {Cyber Threat Intelligence Dataset},
202
+ year = {2026},
203
+ publisher = {HuggingFace},
204
+ url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
205
+ }
206
+ ```