Datasets:
Add dataset card
Browse files
README.md
CHANGED
|
@@ -1,129 +1,206 @@
|
|
| 1 |
---
|
| 2 |
-
|
| 3 |
-
|
| 4 |
-
|
| 5 |
-
-
|
| 6 |
-
|
| 7 |
-
|
| 8 |
-
|
| 9 |
-
|
| 10 |
-
|
| 11 |
-
-
|
| 12 |
-
|
| 13 |
-
-
|
| 14 |
-
|
| 15 |
-
-
|
| 16 |
-
|
| 17 |
-
-
|
| 18 |
-
|
| 19 |
-
|
| 20 |
-
|
| 21 |
-
|
| 22 |
-
dtype: string
|
| 23 |
-
- name: cvss_severity
|
| 24 |
-
dtype: string
|
| 25 |
-
- name: attack_vector
|
| 26 |
-
dtype: string
|
| 27 |
-
- name: attack_complexity
|
| 28 |
-
dtype: string
|
| 29 |
-
- name: privileges_required
|
| 30 |
-
dtype: string
|
| 31 |
-
- name: user_interaction
|
| 32 |
-
dtype: string
|
| 33 |
-
- name: scope
|
| 34 |
-
dtype: string
|
| 35 |
-
- name: confidentiality_impact
|
| 36 |
-
dtype: string
|
| 37 |
-
- name: integrity_impact
|
| 38 |
-
dtype: string
|
| 39 |
-
- name: availability_impact
|
| 40 |
-
dtype: string
|
| 41 |
-
- name: exploitability_score
|
| 42 |
-
dtype: string
|
| 43 |
-
- name: impact_score
|
| 44 |
-
dtype: string
|
| 45 |
-
- name: attack_type
|
| 46 |
-
dtype: string
|
| 47 |
-
- name: likely_mitre_tactic
|
| 48 |
-
dtype: string
|
| 49 |
-
- name: risk_score
|
| 50 |
-
dtype: string
|
| 51 |
-
- name: risk_level
|
| 52 |
-
dtype: string
|
| 53 |
-
- name: primary_vendor_product
|
| 54 |
-
dtype: string
|
| 55 |
-
- name: in_cisa_kev
|
| 56 |
-
dtype: string
|
| 57 |
-
- name: ransomware_use
|
| 58 |
-
dtype: string
|
| 59 |
-
- name: kev_required_action
|
| 60 |
-
dtype: string
|
| 61 |
-
splits:
|
| 62 |
-
- name: train
|
| 63 |
-
num_bytes: 4519629
|
| 64 |
-
num_examples: 5000
|
| 65 |
-
download_size: 1068547
|
| 66 |
-
dataset_size: 4519629
|
| 67 |
-
- config_name: instructions
|
| 68 |
-
features:
|
| 69 |
-
- name: instruction
|
| 70 |
-
dtype: string
|
| 71 |
-
- name: input
|
| 72 |
-
dtype: string
|
| 73 |
-
- name: output
|
| 74 |
-
dtype: string
|
| 75 |
-
splits:
|
| 76 |
-
- name: train
|
| 77 |
-
num_bytes: 14942525
|
| 78 |
-
num_examples: 14189
|
| 79 |
-
- name: test
|
| 80 |
-
num_bytes: 1667748
|
| 81 |
-
num_examples: 1577
|
| 82 |
-
download_size: 3840922
|
| 83 |
-
dataset_size: 16610273
|
| 84 |
-
- config_name: mitre_attack
|
| 85 |
-
features:
|
| 86 |
-
- name: technique_id
|
| 87 |
-
dtype: string
|
| 88 |
-
- name: technique_name
|
| 89 |
-
dtype: string
|
| 90 |
-
- name: tactics
|
| 91 |
-
dtype: string
|
| 92 |
-
- name: description
|
| 93 |
-
dtype: string
|
| 94 |
-
- name: detection
|
| 95 |
-
dtype: string
|
| 96 |
-
- name: platforms
|
| 97 |
-
dtype: string
|
| 98 |
-
- name: data_sources
|
| 99 |
-
dtype: string
|
| 100 |
-
- name: is_subtechnique
|
| 101 |
-
dtype: string
|
| 102 |
-
- name: url
|
| 103 |
-
dtype: string
|
| 104 |
-
- name: created
|
| 105 |
-
dtype: string
|
| 106 |
-
- name: modified
|
| 107 |
-
dtype: string
|
| 108 |
-
splits:
|
| 109 |
-
- name: train
|
| 110 |
-
num_bytes: 820866
|
| 111 |
-
num_examples: 697
|
| 112 |
-
download_size: 386375
|
| 113 |
-
dataset_size: 820866
|
| 114 |
-
configs:
|
| 115 |
-
- config_name: cve_data
|
| 116 |
-
data_files:
|
| 117 |
-
- split: train
|
| 118 |
-
path: cve_data/train-*
|
| 119 |
-
- config_name: instructions
|
| 120 |
-
data_files:
|
| 121 |
-
- split: train
|
| 122 |
-
path: instructions/train-*
|
| 123 |
-
- split: test
|
| 124 |
-
path: instructions/test-*
|
| 125 |
-
- config_name: mitre_attack
|
| 126 |
-
data_files:
|
| 127 |
-
- split: train
|
| 128 |
-
path: mitre_attack/train-*
|
| 129 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
---
|
| 2 |
+
license: mit
|
| 3 |
+
task_categories:
|
| 4 |
+
- text-generation
|
| 5 |
+
- text-classification
|
| 6 |
+
- question-answering
|
| 7 |
+
language:
|
| 8 |
+
- en
|
| 9 |
+
tags:
|
| 10 |
+
- cybersecurity
|
| 11 |
+
- vulnerability
|
| 12 |
+
- cve
|
| 13 |
+
- mitre-attack
|
| 14 |
+
- threat-intelligence
|
| 15 |
+
- security
|
| 16 |
+
- nvd
|
| 17 |
+
- cisa-kev
|
| 18 |
+
- infosec
|
| 19 |
+
size_categories:
|
| 20 |
+
- 1K<n<10K
|
| 21 |
+
pretty_name: Cyber Threat Intelligence Dataset
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 22 |
---
|
| 23 |
+
|
| 24 |
+
# Cyber Threat Intelligence Dataset
|
| 25 |
+
|
| 26 |
+
> A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research.
|
| 27 |
+
|
| 28 |
+
**Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
|
| 29 |
+
**License:** MIT
|
| 30 |
+
**Created:** 2026
|
| 31 |
+
|
| 32 |
+
---
|
| 33 |
+
|
| 34 |
+
## Dataset Description
|
| 35 |
+
|
| 36 |
+
This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources:
|
| 37 |
+
|
| 38 |
+
1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring
|
| 39 |
+
2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods
|
| 40 |
+
3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild
|
| 41 |
+
|
| 42 |
+
Each CVE record is enriched with:
|
| 43 |
+
- CVSS v3.1 base scores and detailed metrics
|
| 44 |
+
- Attack type classification (mapped from CWE)
|
| 45 |
+
- MITRE ATT&CK tactic mapping
|
| 46 |
+
- Custom risk scoring (0-100)
|
| 47 |
+
- CISA KEV status (actively exploited or not)
|
| 48 |
+
- Ransomware usage indicators
|
| 49 |
+
|
| 50 |
+
Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts.
|
| 51 |
+
|
| 52 |
+
---
|
| 53 |
+
|
| 54 |
+
## Dataset Structure
|
| 55 |
+
|
| 56 |
+
### Configurations
|
| 57 |
+
|
| 58 |
+
| Split | Description | Rows |
|
| 59 |
+
|-------|-------------|------|
|
| 60 |
+
| `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 |
|
| 61 |
+
| `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 |
|
| 62 |
+
| `train` | Instruction-tuning training split | ~15000 |
|
| 63 |
+
| `test` | Instruction-tuning evaluation split | ~1500 |
|
| 64 |
+
|
| 65 |
+
### CVE Data Schema
|
| 66 |
+
|
| 67 |
+
| Column | Type | Description |
|
| 68 |
+
|--------|------|-------------|
|
| 69 |
+
| `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) |
|
| 70 |
+
| `description` | string | Vulnerability description |
|
| 71 |
+
| `cvss_score` | float | CVSS v3.1 base score (0-10) |
|
| 72 |
+
| `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW |
|
| 73 |
+
| `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL |
|
| 74 |
+
| `attack_complexity` | string | LOW / HIGH |
|
| 75 |
+
| `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) |
|
| 76 |
+
| `cwe_ids` | string | CWE weakness identifiers |
|
| 77 |
+
| `risk_score` | float | Custom composite risk score (0-100) |
|
| 78 |
+
| `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO |
|
| 79 |
+
| `exploit_available` | bool | Whether public exploits exist |
|
| 80 |
+
| `in_cisa_kev` | bool | Whether listed in CISA KEV catalog |
|
| 81 |
+
| `ransomware_use` | string | Known ransomware campaign usage |
|
| 82 |
+
| `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic |
|
| 83 |
+
| `affected_products` | string | Vendor/product affected |
|
| 84 |
+
|
| 85 |
+
### Instruction Data Schema
|
| 86 |
+
|
| 87 |
+
| Column | Type | Description |
|
| 88 |
+
|--------|------|-------------|
|
| 89 |
+
| `instruction` | string | The task instruction |
|
| 90 |
+
| `input` | string | CVE or technique context |
|
| 91 |
+
| `output` | string | Detailed expert analysis |
|
| 92 |
+
|
| 93 |
+
**Instruction types include:**
|
| 94 |
+
- CVE vulnerability analysis
|
| 95 |
+
- Remediation recommendations
|
| 96 |
+
- Risk scoring assessments
|
| 97 |
+
- MITRE ATT&CK mapping
|
| 98 |
+
- Triage prioritization decisions
|
| 99 |
+
- MITRE technique explanations
|
| 100 |
+
|
| 101 |
+
---
|
| 102 |
+
|
| 103 |
+
## Usage
|
| 104 |
+
|
| 105 |
+
### Load the Dataset
|
| 106 |
+
|
| 107 |
+
```python
|
| 108 |
+
from datasets import load_dataset
|
| 109 |
+
|
| 110 |
+
# Load all splits
|
| 111 |
+
dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence")
|
| 112 |
+
|
| 113 |
+
# Access CVE data
|
| 114 |
+
cve_data = dataset["cve_data"]
|
| 115 |
+
print(f"Total CVEs: {len(cve_data)}")
|
| 116 |
+
print(cve_data[0])
|
| 117 |
+
|
| 118 |
+
# Access MITRE techniques
|
| 119 |
+
mitre = dataset["mitre_attack"]
|
| 120 |
+
print(f"Total techniques: {len(mitre)}")
|
| 121 |
+
|
| 122 |
+
# Access training data
|
| 123 |
+
train = dataset["train"]
|
| 124 |
+
print(f"Training samples: {len(train)}")
|
| 125 |
+
print(train[0]["instruction"])
|
| 126 |
+
```
|
| 127 |
+
|
| 128 |
+
### Filter Critical Vulnerabilities
|
| 129 |
+
|
| 130 |
+
```python
|
| 131 |
+
critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL")
|
| 132 |
+
print(f"Critical CVEs: {len(critical_cves)}")
|
| 133 |
+
```
|
| 134 |
+
|
| 135 |
+
### Get Actively Exploited CVEs
|
| 136 |
+
|
| 137 |
+
```python
|
| 138 |
+
exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True")
|
| 139 |
+
print(f"Actively exploited CVEs: {len(exploited)}")
|
| 140 |
+
```
|
| 141 |
+
|
| 142 |
+
### Use for Fine-Tuning
|
| 143 |
+
|
| 144 |
+
```python
|
| 145 |
+
# Ready-to-use instruction format
|
| 146 |
+
for sample in dataset["train"]:
|
| 147 |
+
instruction = sample["instruction"]
|
| 148 |
+
input_text = sample["input"]
|
| 149 |
+
output = sample["output"]
|
| 150 |
+
# Format for your model and train!
|
| 151 |
+
```
|
| 152 |
+
|
| 153 |
+
---
|
| 154 |
+
|
| 155 |
+
## Data Sources
|
| 156 |
+
|
| 157 |
+
| Source | URL | License |
|
| 158 |
+
|--------|-----|---------|
|
| 159 |
+
| NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain |
|
| 160 |
+
| MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 |
|
| 161 |
+
| CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain |
|
| 162 |
+
|
| 163 |
+
All data is collected from publicly available, free government and community sources.
|
| 164 |
+
|
| 165 |
+
---
|
| 166 |
+
|
| 167 |
+
## Intended Uses
|
| 168 |
+
|
| 169 |
+
- **Fine-tuning LLMs** for cybersecurity analysis tasks
|
| 170 |
+
- **Training classifiers** for vulnerability severity prediction
|
| 171 |
+
- **Building RAG systems** for security knowledge retrieval
|
| 172 |
+
- **Research** on automated vulnerability assessment
|
| 173 |
+
- **Education** on cybersecurity threat intelligence
|
| 174 |
+
|
| 175 |
+
## Limitations
|
| 176 |
+
|
| 177 |
+
- CVE descriptions are sourced from NVD and may not reflect the latest updates
|
| 178 |
+
- Risk scores are computed using a custom formula and may differ from organizational assessments
|
| 179 |
+
- MITRE ATT&CK mappings from CWE are approximate and based on common associations
|
| 180 |
+
- The instruction-tuning data is synthetically generated from structured fields
|
| 181 |
+
|
| 182 |
+
---
|
| 183 |
+
|
| 184 |
+
## About the Author
|
| 185 |
+
|
| 186 |
+
**Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence.
|
| 187 |
+
|
| 188 |
+
- **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle)
|
| 189 |
+
- **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate)
|
| 190 |
+
- **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI)
|
| 191 |
+
- **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks
|
| 192 |
+
- **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a)
|
| 193 |
+
|
| 194 |
+
---
|
| 195 |
+
|
| 196 |
+
## Citation
|
| 197 |
+
|
| 198 |
+
```bibtex
|
| 199 |
+
@dataset{dahivalkar2026cyberthreat,
|
| 200 |
+
author = {Dahivalkar, Soham},
|
| 201 |
+
title = {Cyber Threat Intelligence Dataset},
|
| 202 |
+
year = {2026},
|
| 203 |
+
publisher = {HuggingFace},
|
| 204 |
+
url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence}
|
| 205 |
+
}
|
| 206 |
+
```
|