Update README.md
Browse files
README.md
CHANGED
|
@@ -7,4 +7,65 @@ language:
|
|
| 7 |
tags:
|
| 8 |
- cyber
|
| 9 |
pretty_name: Anno CTR
|
| 10 |
-
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 7 |
tags:
|
| 8 |
- cyber
|
| 9 |
pretty_name: Anno CTR
|
| 10 |
+
---
|
| 11 |
+
|
| 12 |
+
<!---
|
| 13 |
+
|
| 14 |
+
Copyright (c) 2023 Robert Bosch GmbH and its subsidiaries.
|
| 15 |
+
|
| 16 |
+
-->
|
| 17 |
+
|
| 18 |
+
# AnnoCTR Resources
|
| 19 |
+
|
| 20 |
+
This repository contains the companion material for the following publication:
|
| 21 |
+
|
| 22 |
+
> Lukas Lange, Marc Müller, Ghazaleh Haratinezhad Torbati, Dragan Milchevski, Patrick Grau, Subhash Pujari, Annemarie Friedrich. **AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports.** LREC-COLING 2024.
|
| 23 |
+
|
| 24 |
+
Please cite this paper if using the dataset or the code, and direct any questions to [Lukas Lange](mailto:lukas.lange@de.bosch.com).
|
| 25 |
+
The paper can be found at the [ACL Anthology (tbd.)](https://www.aclweb.org/anthology/TODO/) or at
|
| 26 |
+
[ArXiv](https://arxiv.org/abs/2404.07765).
|
| 27 |
+
|
| 28 |
+
|
| 29 |
+
## Purpose of this Software
|
| 30 |
+
|
| 31 |
+
This software is a research prototype, solely developed for and published as
|
| 32 |
+
part of the publication cited above. It will neither be maintained nor monitored in any way.
|
| 33 |
+
|
| 34 |
+
|
| 35 |
+
## The AnnoCTR Corpus
|
| 36 |
+
|
| 37 |
+
AnnoCTR consists of 400 cyber threat reports that have been obtained from commercial CTI vendors.
|
| 38 |
+
The reports describe threat-related information such as tactics, techniques, actors, tools, and targeted industries.
|
| 39 |
+
The reports have been annotated by a domain expert with named entities, temporal expressions, and cybersecurity-specific concepts.
|
| 40 |
+
The annotations include mentions of organizations, locations, industry sectors, time expressions,
|
| 41 |
+
code snippets, hacker groups, malware, tools, tactics, and techniques.
|
| 42 |
+
|
| 43 |
+
The dataset is split into three parts: train, dev, and test, with 60%, 15%, and 25% of the documents,
|
| 44 |
+
respectively.
|
| 45 |
+
The train set is used for model training, the dev set is used for model selection,
|
| 46 |
+
and the test set is used for evaluation.
|
| 47 |
+
|
| 48 |
+
For further information on the annotation scheme,
|
| 49 |
+
please refer to our paper and the annotation guidelines for the
|
| 50 |
+
[general concepts](Annotation_Guidelines_General_Layer.pdf) and
|
| 51 |
+
[cybersecurity-specific concepts](Annotation_Guidelines_Cysec_Layer.pdf).
|
| 52 |
+
|
| 53 |
+
### Corpus File Formats
|
| 54 |
+
|
| 55 |
+
This is an HF friendly dataset loader for training LLMs on the NER tags.
|
| 56 |
+
|
| 57 |
+
|
| 58 |
+
### Acknowledgements
|
| 59 |
+
|
| 60 |
+
The reports have been kindly donated by
|
| 61 |
+
[Intel471](https://intel471.com/blog}),
|
| 62 |
+
[Lab52](https://lab52.io/blog/),
|
| 63 |
+
the [threat intelligence division of S2 Grupo](https://s2grupo.es/),
|
| 64 |
+
[Proofpoint](https://www.proofpoint.com/us/blog),
|
| 65 |
+
[QuoIntelligence](https://quointelligence.eu/blog),
|
| 66 |
+
and [ZScaler](https://www.zscaler.com/blogs/security-research).
|
| 67 |
+
|
| 68 |
+
|
| 69 |
+
## License
|
| 70 |
+
|
| 71 |
+
The AnnoCTR corpus located in the folder [AnnoCTR](AnnoCTR) is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/) (CC-BY-SA 4.0).
|