Update README.md
Browse files
README.md
CHANGED
|
@@ -11,8 +11,6 @@ language:
|
|
| 11 |
The **TTPXHunter** model is designed to automate the extraction of actionable threat intelligence by identifying **Tactics, Techniques, and Procedures (TTPs)** from unstructured narrative threat reports. Using natural language processing (NLP) techniques, TTPXHunter processes text, identifying adversarial tactics and techniques in accordance with established frameworks like MITRE ATT&CK. The model filters predictions based on a confidence threshold, ensuring only high-confidence TTPs are considered for analysis. Once identified, these TTPs are mapped to predefined labels, converting them into actionable insights for cybersecurity teams. This automation enhances the speed and accuracy of threat intelligence gathering, allowing for timely and effective responses to emerging threats.
|
| 12 |
|
| 13 |
|
| 14 |
-
## Model Details
|
| 15 |
-
|
| 16 |
### Model Description
|
| 17 |
|
| 18 |
<!-- Provide a longer summary of what this model is. -->
|
|
@@ -218,9 +216,7 @@ publisher = {Association for Computing Machinery},
|
|
| 218 |
address = {New York, NY, USA},
|
| 219 |
url = {https://doi.org/10.1145/3696427},
|
| 220 |
doi = {10.1145/3696427},
|
| 221 |
-
|
| 222 |
-
note = {Just Accepted},
|
| 223 |
-
journal = {Digital Threats},
|
| 224 |
month = {sep},
|
| 225 |
keywords = {Threat Intelligence, TTP Extraction, MITRE ATT&CK, Natural Language Processing, Threat Intelligence Extraction, TTP Classification, Cyber Security and AI, Cyber Security Threats, NLP, Cybersecurity}
|
| 226 |
}
|
|
|
|
| 11 |
The **TTPXHunter** model is designed to automate the extraction of actionable threat intelligence by identifying **Tactics, Techniques, and Procedures (TTPs)** from unstructured narrative threat reports. Using natural language processing (NLP) techniques, TTPXHunter processes text, identifying adversarial tactics and techniques in accordance with established frameworks like MITRE ATT&CK. The model filters predictions based on a confidence threshold, ensuring only high-confidence TTPs are considered for analysis. Once identified, these TTPs are mapped to predefined labels, converting them into actionable insights for cybersecurity teams. This automation enhances the speed and accuracy of threat intelligence gathering, allowing for timely and effective responses to emerging threats.
|
| 12 |
|
| 13 |
|
|
|
|
|
|
|
| 14 |
### Model Description
|
| 15 |
|
| 16 |
<!-- Provide a longer summary of what this model is. -->
|
|
|
|
| 216 |
address = {New York, NY, USA},
|
| 217 |
url = {https://doi.org/10.1145/3696427},
|
| 218 |
doi = {10.1145/3696427},
|
| 219 |
+
journal = {Digital Threats: Research and Practice},
|
|
|
|
|
|
|
| 220 |
month = {sep},
|
| 221 |
keywords = {Threat Intelligence, TTP Extraction, MITRE ATT&CK, Natural Language Processing, Threat Intelligence Extraction, TTP Classification, Cyber Security and AI, Cyber Security Threats, NLP, Cybersecurity}
|
| 222 |
}
|