priamai commited on
Commit
68faaf7
·
verified ·
1 Parent(s): 720803c

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +62 -1
README.md CHANGED
@@ -7,4 +7,65 @@ language:
7
  tags:
8
  - cyber
9
  pretty_name: Anno CTR
10
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
7
  tags:
8
  - cyber
9
  pretty_name: Anno CTR
10
+ ---
11
+
12
+ <!---
13
+
14
+ Copyright (c) 2023 Robert Bosch GmbH and its subsidiaries.
15
+
16
+ -->
17
+
18
+ # AnnoCTR Resources
19
+
20
+ This repository contains the companion material for the following publication:
21
+
22
+ > Lukas Lange, Marc Müller, Ghazaleh Haratinezhad Torbati, Dragan Milchevski, Patrick Grau, Subhash Pujari, Annemarie Friedrich. **AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports.** LREC-COLING 2024.
23
+
24
+ Please cite this paper if using the dataset or the code, and direct any questions to [Lukas Lange](mailto:lukas.lange@de.bosch.com).
25
+ The paper can be found at the [ACL Anthology (tbd.)](https://www.aclweb.org/anthology/TODO/) or at
26
+ [ArXiv](https://arxiv.org/abs/2404.07765).
27
+
28
+
29
+ ## Purpose of this Software
30
+
31
+ This software is a research prototype, solely developed for and published as
32
+ part of the publication cited above. It will neither be maintained nor monitored in any way.
33
+
34
+
35
+ ## The AnnoCTR Corpus
36
+
37
+ AnnoCTR consists of 400 cyber threat reports that have been obtained from commercial CTI vendors.
38
+ The reports describe threat-related information such as tactics, techniques, actors, tools, and targeted industries.
39
+ The reports have been annotated by a domain expert with named entities, temporal expressions, and cybersecurity-specific concepts.
40
+ The annotations include mentions of organizations, locations, industry sectors, time expressions,
41
+ code snippets, hacker groups, malware, tools, tactics, and techniques.
42
+
43
+ The dataset is split into three parts: train, dev, and test, with 60%, 15%, and 25% of the documents,
44
+ respectively.
45
+ The train set is used for model training, the dev set is used for model selection,
46
+ and the test set is used for evaluation.
47
+
48
+ For further information on the annotation scheme,
49
+ please refer to our paper and the annotation guidelines for the
50
+ [general concepts](Annotation_Guidelines_General_Layer.pdf) and
51
+ [cybersecurity-specific concepts](Annotation_Guidelines_Cysec_Layer.pdf).
52
+
53
+ ### Corpus File Formats
54
+
55
+ This is an HF friendly dataset loader for training LLMs on the NER tags.
56
+
57
+
58
+ ### Acknowledgements
59
+
60
+ The reports have been kindly donated by
61
+ [Intel471](https://intel471.com/blog}),
62
+ [Lab52](https://lab52.io/blog/),
63
+ the [threat intelligence division of S2 Grupo](https://s2grupo.es/),
64
+ [Proofpoint](https://www.proofpoint.com/us/blog),
65
+ [QuoIntelligence](https://quointelligence.eu/blog),
66
+ and [ZScaler](https://www.zscaler.com/blogs/security-research).
67
+
68
+
69
+ ## License
70
+
71
+ The AnnoCTR corpus located in the folder [AnnoCTR](AnnoCTR) is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/) (CC-BY-SA 4.0).