Update README.md
Browse files
README.md
CHANGED
|
@@ -1,22 +1,68 @@
|
|
| 1 |
-
---
|
| 2 |
-
license: openrail
|
| 3 |
-
dataset_info:
|
| 4 |
-
features:
|
| 5 |
-
- name: instruction
|
| 6 |
-
dtype: string
|
| 7 |
-
- name: input
|
| 8 |
-
dtype: string
|
| 9 |
-
- name: output
|
| 10 |
-
dtype: string
|
| 11 |
-
splits:
|
| 12 |
-
- name: train
|
| 13 |
-
num_bytes: 264800612
|
| 14 |
-
num_examples: 238994
|
| 15 |
-
download_size: 87762052
|
| 16 |
-
dataset_size: 264800612
|
| 17 |
-
configs:
|
| 18 |
-
- config_name: default
|
| 19 |
-
data_files:
|
| 20 |
-
- split: train
|
| 21 |
-
path: data/train-*
|
| 22 |
-
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: openrail
|
| 3 |
+
dataset_info:
|
| 4 |
+
features:
|
| 5 |
+
- name: instruction
|
| 6 |
+
dtype: string
|
| 7 |
+
- name: input
|
| 8 |
+
dtype: string
|
| 9 |
+
- name: output
|
| 10 |
+
dtype: string
|
| 11 |
+
splits:
|
| 12 |
+
- name: train
|
| 13 |
+
num_bytes: 264800612
|
| 14 |
+
num_examples: 238994
|
| 15 |
+
download_size: 87762052
|
| 16 |
+
dataset_size: 264800612
|
| 17 |
+
configs:
|
| 18 |
+
- config_name: default
|
| 19 |
+
data_files:
|
| 20 |
+
- split: train
|
| 21 |
+
path: data/train-*
|
| 22 |
+
---
|
| 23 |
+
|
| 24 |
+
# Dataset Card for Dataset Name
|
| 25 |
+
|
| 26 |
+
The dataset combines information from MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) and
|
| 27 |
+
CVE (Common Vulnerabilities and Exposures) to provide a comprehensive resource for training language models
|
| 28 |
+
on cybersecurity concepts and vulnerabilities.
|
| 29 |
+
|
| 30 |
+
## Dataset Details
|
| 31 |
+
|
| 32 |
+
### Dataset Description
|
| 33 |
+
|
| 34 |
+
Each entry in the dataset typically includes:
|
| 35 |
+
|
| 36 |
+
- MITRE ATT&CK tactics and techniques
|
| 37 |
+
- CVE identifiers and descriptions
|
| 38 |
+
- Relationships between ATT&CK techniques and CVEs
|
| 39 |
+
- Additional metadata relevant to cybersecurity analysis
|
| 40 |
+
|
| 41 |
+
|
| 42 |
+
|
| 43 |
+
### Dataset Sources [optional]
|
| 44 |
+
|
| 45 |
+
**Mitre Att&ck:**
|
| 46 |
+
(https://github.com/mitre/cti/raw/master/enterprise-attack/enterprise-attack.json)[https://github.com/mitre/cti/raw/master/enterprise-attack/enterprise-attack.json]
|
| 47 |
+
|
| 48 |
+
**Mapping CVE-Attack:**
|
| 49 |
+
[https://center-for-threat-informed-defense.github.io/mappings-explorer/external/cve/]
|
| 50 |
+
|
| 51 |
+
**CVEs::**
|
| 52 |
+
[https://www.cve.org/downloads]
|
| 53 |
+
|
| 54 |
+
## Uses
|
| 55 |
+
|
| 56 |
+
This dataset is provided to facilitate llama finetuning with MITRE information.
|
| 57 |
+
|
| 58 |
+
|
| 59 |
+
#### Who are the source data producers?
|
| 60 |
+
|
| 61 |
+
All data come from MITRE public resources (see sources).
|
| 62 |
+
Data may be outdated, please note that this is not a MITRE associated project.
|
| 63 |
+
|
| 64 |
+
|
| 65 |
+
|
| 66 |
+
## More Information [optional]
|
| 67 |
+
|
| 68 |
+
[More Information Needed]
|