--- license: mit task_categories: - text-generation - text-classification - question-answering language: - en tags: - cybersecurity - vulnerability - cve - mitre-attack - threat-intelligence - security - nvd - cisa-kev - infosec size_categories: - 1K A comprehensive cybersecurity dataset combining **CVE vulnerability data**, **MITRE ATT&CK techniques**, and **CISA Known Exploited Vulnerabilities** — structured for AI/ML training and security research. **Author:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a) **License:** MIT **Created:** 2026 --- ## Dataset Description This dataset provides structured cybersecurity intelligence data collected from three authoritative public sources: 1. **NVD (National Vulnerability Database)** — CVE vulnerability records with CVSS scoring 2. **MITRE ATT&CK** — Enterprise attack techniques, tactics, and detection methods 3. **CISA KEV** — Known Exploited Vulnerabilities actively used in the wild Each CVE record is enriched with: - CVSS v3.1 base scores and detailed metrics - Attack type classification (mapped from CWE) - MITRE ATT&CK tactic mapping - Custom risk scoring (0-100) - CISA KEV status (actively exploited or not) - Ransomware usage indicators Additionally, the dataset includes **instruction-tuning data** for fine-tuning LLMs as cybersecurity analysts. --- ## Dataset Structure ### Configurations | Split | Description | Rows | |-------|-------------|------| | `cve_data` | CVE vulnerability records with CVSS, CWE, risk scores | ~5000 | | `mitre_attack` | MITRE ATT&CK enterprise techniques | ~700 | | `train` | Instruction-tuning training split | ~15000 | | `test` | Instruction-tuning evaluation split | ~1500 | ### CVE Data Schema | Column | Type | Description | |--------|------|-------------| | `cve_id` | string | CVE identifier (e.g., CVE-2024-3400) | | `description` | string | Vulnerability description | | `cvss_score` | float | CVSS v3.1 base score (0-10) | | `cvss_severity` | string | CRITICAL / HIGH / MEDIUM / LOW | | `attack_vector` | string | NETWORK / ADJACENT / LOCAL / PHYSICAL | | `attack_complexity` | string | LOW / HIGH | | `attack_type` | string | Mapped from CWE (e.g., SQL Injection, Buffer Overflow) | | `cwe_ids` | string | CWE weakness identifiers | | `risk_score` | float | Custom composite risk score (0-100) | | `risk_level` | string | CRITICAL / HIGH / MEDIUM / LOW / INFO | | `exploit_available` | bool | Whether public exploits exist | | `in_cisa_kev` | bool | Whether listed in CISA KEV catalog | | `ransomware_use` | string | Known ransomware campaign usage | | `likely_mitre_tactic` | string | Mapped MITRE ATT&CK tactic | | `affected_products` | string | Vendor/product affected | ### Instruction Data Schema | Column | Type | Description | |--------|------|-------------| | `instruction` | string | The task instruction | | `input` | string | CVE or technique context | | `output` | string | Detailed expert analysis | **Instruction types include:** - CVE vulnerability analysis - Remediation recommendations - Risk scoring assessments - MITRE ATT&CK mapping - Triage prioritization decisions - MITRE technique explanations --- ## Usage ### Load the Dataset ```python from datasets import load_dataset # Load all splits dataset = load_dataset("soham-dahivalkar/cyber-threat-intelligence") # Access CVE data cve_data = dataset["cve_data"] print(f"Total CVEs: {len(cve_data)}") print(cve_data[0]) # Access MITRE techniques mitre = dataset["mitre_attack"] print(f"Total techniques: {len(mitre)}") # Access training data train = dataset["train"] print(f"Training samples: {len(train)}") print(train[0]["instruction"]) ``` ### Filter Critical Vulnerabilities ```python critical_cves = cve_data.filter(lambda x: x["risk_level"] == "CRITICAL") print(f"Critical CVEs: {len(critical_cves)}") ``` ### Get Actively Exploited CVEs ```python exploited = cve_data.filter(lambda x: x["in_cisa_kev"] == "True") print(f"Actively exploited CVEs: {len(exploited)}") ``` ### Use for Fine-Tuning ```python # Ready-to-use instruction format for sample in dataset["train"]: instruction = sample["instruction"] input_text = sample["input"] output = sample["output"] # Format for your model and train! ``` --- ## Data Sources | Source | URL | License | |--------|-----|---------| | NVD (National Vulnerability Database) | https://nvd.nist.gov | Public Domain | | MITRE ATT&CK | https://attack.mitre.org | Apache 2.0 | | CISA KEV Catalog | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Public Domain | All data is collected from publicly available, free government and community sources. --- ## Intended Uses - **Fine-tuning LLMs** for cybersecurity analysis tasks - **Training classifiers** for vulnerability severity prediction - **Building RAG systems** for security knowledge retrieval - **Research** on automated vulnerability assessment - **Education** on cybersecurity threat intelligence ## Limitations - CVE descriptions are sourced from NVD and may not reflect the latest updates - Risk scores are computed using a custom formula and may differ from organizational assessments - MITRE ATT&CK mappings from CWE are approximate and based on common associations - The instruction-tuning data is synthetically generated from structured fields --- ## About the Author **Soham Dahivalkar** — Generative AI Engineer specializing in agentic AI systems, enterprise RAG, and cybersecurity intelligence. - **Published Author:** "Generative AI: High Stakes Cyber Security" (Amazon Kindle) - **Research:** "AI in Security: ML Approach for Vulnerability Management" (ResearchGate) - **Open Source:** `ai-bridge-kit` — Unified Python SDK for AI Providers (PyPI) - **Experience:** Alembic Pharmaceuticals, CyberNX Technologies, TalaKunchi Networks - **LinkedIn:** [Soham Dahivalkar](https://www.linkedin.com/in/soham-dahivalkar-82415426a) --- ## Citation ```bibtex @dataset{dahivalkar2026cyberthreat, author = {Dahivalkar, Soham}, title = {Cyber Threat Intelligence Dataset}, year = {2026}, publisher = {HuggingFace}, url = {https://huggingface.co/datasets/soham-dahivalkar/cyber-threat-intelligence} } ```