DatasetSubmission commited on
Commit
18c57b3
·
verified ·
1 Parent(s): fb61b92

Upload README.md with huggingface_hub

Browse files
Files changed (1) hide show
  1. README.md +244 -0
README.md ADDED
@@ -0,0 +1,244 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ language:
3
+ - en
4
+ - zh
5
+ - ru
6
+ license: cc-by-4.0
7
+ size_categories:
8
+ - 1M<n<10M
9
+ task_categories:
10
+ - text-classification
11
+ - information-retrieval
12
+ tags:
13
+ - cybersecurity
14
+ - exploit
15
+ - vulnerability
16
+ - CVE
17
+ - hacker-forum
18
+ - threat-intelligence
19
+ - NLP
20
+ - benchmark
21
+ pretty_name: HackerSignal
22
+ dataset_info:
23
+ features:
24
+ - name: unified_id
25
+ dtype: string
26
+ - name: source_dataset
27
+ dtype: string
28
+ - name: source_layer
29
+ dtype: string
30
+ - name: text
31
+ dtype: string
32
+ - name: timestamp
33
+ dtype: string
34
+ - name: forum_id
35
+ dtype: string
36
+ - name: author_hash
37
+ dtype: string
38
+ - name: release_mode
39
+ dtype: string
40
+ splits:
41
+ - name: full
42
+ num_examples: 7447646
43
+ configs:
44
+ - config_name: default
45
+ data_files:
46
+ - split: full
47
+ path: unified_hacker_communities_neurips_public.jsonl
48
+ - config_name: sample
49
+ data_files:
50
+ - split: full
51
+ path: hackersignal_sample_10k.jsonl
52
+ - config_name: task1_exploit_clf
53
+ data_files:
54
+ - split: train
55
+ path: benchmark/task1_exploit_clf/train.jsonl
56
+ - split: validation
57
+ path: benchmark/task1_exploit_clf/val.jsonl
58
+ - split: test
59
+ path: benchmark/task1_exploit_clf/test.jsonl
60
+ - config_name: task2_cve_linkage
61
+ data_files:
62
+ - split: train
63
+ path: benchmark/task2_cve_linkage/train.jsonl
64
+ - split: validation
65
+ path: benchmark/task2_cve_linkage/val.jsonl
66
+ - split: test
67
+ path: benchmark/task2_cve_linkage/test.jsonl
68
+ - split: corpus
69
+ path: benchmark/task2_cve_linkage/corpus.jsonl
70
+ - config_name: task3_severity
71
+ data_files:
72
+ - split: train
73
+ path: benchmark/task3_severity/train.jsonl
74
+ - split: validation
75
+ path: benchmark/task3_severity/val.jsonl
76
+ - split: test
77
+ path: benchmark/task3_severity/test.jsonl
78
+ - config_name: task4_hacker_exploit_labeling
79
+ data_files:
80
+ - split: train
81
+ path: benchmark/task4_hacker_exploit_labeling/train.jsonl
82
+ - split: validation
83
+ path: benchmark/task4_hacker_exploit_labeling/val.jsonl
84
+ - split: test
85
+ path: benchmark/task4_hacker_exploit_labeling/test.jsonl
86
+ - config_name: task5_hacker_signal_detection
87
+ data_files:
88
+ - split: train
89
+ path: benchmark/task5_hacker_signal_detection/train.jsonl
90
+ - split: validation
91
+ path: benchmark/task5_hacker_signal_detection/val.jsonl
92
+ - split: test
93
+ path: benchmark/task5_hacker_signal_detection/test.jsonl
94
+ - split: corpus
95
+ path: benchmark/task5_hacker_signal_detection/corpus.jsonl
96
+ ---
97
+
98
+ # HackerSignal
99
+
100
+ A large-scale, multi-source dataset linking hacker community discourse, exploit databases, vulnerability advisories, and fix commits through a shared CVE identifier space.
101
+
102
+ ## Overview
103
+
104
+ | Statistic | Value |
105
+ |-----------|-------|
106
+ | Documents | 7,447,646 (exact-deduplicated) |
107
+ | Sources | 64 public forum/source identifiers |
108
+ | Source layers | 8 |
109
+ | Temporal span | 1988--2026 |
110
+ | CVE-linked rows | 360,004 |
111
+ | Benchmark tasks | 5 |
112
+
113
+ ## Quick Start
114
+
115
+ ```python
116
+ from datasets import load_dataset
117
+
118
+ # Load the 10K stratified sample (24 MB)
119
+ sample = load_dataset("DatasetSubmission/etg-exploit-text-graph", "sample")
120
+
121
+ # Load a benchmark task
122
+ task1 = load_dataset("DatasetSubmission/etg-exploit-text-graph", "task1_exploit_clf")
123
+
124
+ # Load the full corpus (12 GB)
125
+ full = load_dataset("DatasetSubmission/etg-exploit-text-graph", "default")
126
+ ```
127
+
128
+ ## Source Layers
129
+
130
+ | Layer | Description | Rows |
131
+ |-------|-------------|------|
132
+ | `hacker_community` | Forum posts from hacker/security communities | 6,974,128 |
133
+ | `exploit_archive` | Published exploit code and advisories | 197,393 |
134
+ | `vulnerability_reference` | NVD CVE descriptions and structured advisories | 150,916 |
135
+ | `exploit_qa_reference` | Security Q&A and tutorial content | 68,791 |
136
+ | `advisory_reference` | Vendor and third-party security advisories | 30,361 |
137
+ | `bug_bounty_disclosure` | Public bug bounty reports | 13,720 |
138
+ | `fix_commit_reference` | Vulnerability fix commit messages | 11,104 |
139
+ | `exploitation_reference` | Active exploitation indicators (CISA KEV) | 1,233 |
140
+
141
+ ## Benchmark Tasks
142
+
143
+ ### Task 1: Exploit Relevance Classification
144
+ Binary classification (exploit-relevant vs. not). Temporal split: train (<2022), val (2022--2023), test (2024+).
145
+
146
+ | Split | Rows |
147
+ |-------|------|
148
+ | Train | 1,672 |
149
+ | Val | 440 |
150
+ | Test | 388 |
151
+
152
+ ### Task 2: CVE Linkage Retrieval
153
+ Given source evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Quality-controlled to remove unretrievable rows.
154
+
155
+ | Split | Rows |
156
+ |-------|------|
157
+ | Train | 40,698 |
158
+ | Val | 2,551 |
159
+ | Test | 550 |
160
+ | Corpus | 340,536 |
161
+
162
+ ### Task 3: Severity Prediction
163
+ 4-class CVSS severity prediction (low/medium/high/critical) from advisory text with explicit severity strings stripped.
164
+
165
+ | Split | Rows |
166
+ |-------|------|
167
+ | Train | 6,797 |
168
+ | Val | 12,836 |
169
+ | Test | 11,711 |
170
+
171
+ ### Task 4: Hacker Exploit Labeling
172
+ Ternary weak-supervision task: 0=non-exploit/noise, 1=vulnerability discussion, 2=actionable exploit.
173
+
174
+ | Split | Rows |
175
+ |-------|------|
176
+ | Train | 50,382 |
177
+ | Val | 1,933 |
178
+ | Test | 25,963 |
179
+
180
+ ### Task 5: Hacker Exploit Signal Detection
181
+ Joint detection + retrieval: identify actionable exploit signals and link to NVD CVE context.
182
+
183
+ | Split | Rows |
184
+ |-------|------|
185
+ | Train | 1,146 |
186
+ | Val | 438 |
187
+ | Test | 111 |
188
+ | Corpus | 340,536 |
189
+
190
+ ## Schema
191
+
192
+ Each record in the main corpus contains:
193
+
194
+ | Field | Type | Description |
195
+ |-------|------|-------------|
196
+ | `unified_id` | string | SHA-256-derived release identifier |
197
+ | `source_dataset` | string | Input source file or dataset name |
198
+ | `source_layer` | string | Normalized layer (see above) |
199
+ | `text` | string | UTF-8 post/advisory text (max 8000 chars) |
200
+ | `timestamp` | string | ISO 8601 publication datetime (UTC) |
201
+ | `forum_id` | string | Source identifier |
202
+ | `author_hash` | string | SHA-256 pseudonymized author |
203
+ | `release_mode` | string | Governance mode (see below) |
204
+
205
+ ## Release Governance
206
+
207
+ Records follow source-specific release modes:
208
+
209
+ - **`redistributable_text`** (5 sources): Full text included under public-domain or CC licenses.
210
+ - **`research_text_with_terms`** (9 sources): Text included with source attribution; no commercial reuse.
211
+ - **`metadata_or_pointer_only`** (13 sources): Only metadata, timestamps, CVE refs, text hashes, and lengths; raw text withheld.
212
+
213
+ See `docs/release_governance.md` for the full source matrix, takedown policy, and responsible-use restrictions.
214
+
215
+ ## Responsible Use
216
+
217
+ This dataset is intended for **defensive cybersecurity research** only. Prohibited uses include:
218
+ - Training systems for automated exploit code generation or malware
219
+ - De-anonymizing forum participants outside approved research protocols
220
+ - Operational blocking or law-enforcement decisions based solely on model outputs
221
+ - Republishing text from `metadata_or_pointer_only` sources
222
+
223
+ ## Limitations
224
+
225
+ - English-language bias; non-English communities may be underrepresented
226
+ - Historical forum imports skew toward 2015--2017
227
+ - Task labels are weak (CVE-linkage-derived), not human-annotated
228
+ - ~8% near-duplicate content remains after exact deduplication
229
+ - 1.57M rows under 8 tokens (useful for interaction analysis, not classification)
230
+
231
+ ## Citation
232
+
233
+ ```bibtex
234
+ @inproceedings{hackersignal2026,
235
+ title={HackerSignal: A Multi-Source Dataset for Hacker Community Analysis and CVE Linkage},
236
+ author={Anonymous},
237
+ booktitle={NeurIPS Evaluations \& Datasets Track},
238
+ year={2026}
239
+ }
240
+ ```
241
+
242
+ ## License
243
+
244
+ Code and metadata: CC BY 4.0. Source text retains source-specific terms documented in the governance addendum and release manifest.