yahoo-scm commited on
Commit
9cf7f89
1 Parent(s): bb22c4e

Upload 6 files

Browse files
README.md CHANGED
@@ -1,3 +1,75 @@
1
- ---
2
- license: cc-by-sa-4.0
3
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ <center>
3
+ <img src="./wizard_impact.jpeg" width="600px">
4
+ <p><em>Image generated by DALL-E. </em></p>
5
+ </center>
6
+
7
+ # CVE_KeyPhrases
8
+ CVE_KeyPhrases is a dataset of published CVEs with the Key Risk Phrases (for Impact, Weakness, Attack) extracted.
9
+
10
+ * It is released under license": "[cc-by-sa-4.0](https://creativecommons.org/licenses/by-sa/4.0/)"
11
+ * Please see the BSides Dublin 2024 presentation video and deck.
12
+
13
+ The dataset includes:
14
+ * ~230K published CVEs (excluding those marked Rejected) i.e. all CVEs up to April 3 2024 NVD Published date.
15
+ * The CVE ID, Description text, and Key Risk Phrases
16
+
17
+ As of April 2024, CVE_KeyPhrases stands as the largest dataset of CVEs with extracted Key Risk Phrases with high Precision (how many retrieved items are relevant?) and Recall (how many relevant items are retrieved?).
18
+ * It's an initial release and will be improved and enriched over time.
19
+
20
+ The dataset Key Risk Phrases can be used
21
+ * directly and included with CVEs e.g. https://github.com/CVEProject/cve-schema/blob/30f59c7de92fbc77bddade302601cb500c66f718/schema/docs/cnaContainer-advanced-example.json#L20
22
+ ````
23
+ "impacts": [
24
+ {
25
+ "capecId": "CAPEC-233",
26
+ "descriptions": [
27
+ {
28
+ "lang": "en",
29
+ "value": "CAPEC-233 Privilege Escalation"
30
+ }
31
+ ]
32
+ }
33
+ ],
34
+ ````
35
+ * used to train an ML model for NER or Classification.
36
+
37
+ ## Dataset Details
38
+
39
+ ### Version
40
+ 0.1 Initial Release
41
+ ### Schema
42
+ The dataset includes 3 fields shown below:
43
+ 1. CVE: string: The original CVE ID
44
+ 2. Description: string: The original CVE Description with minor cleaning ( non-ascii characters and newlines removed ).
45
+ 3. KeyPhrases: list of substrings: extracted from Description representing Impact, Vulnerability, Attack.
46
+
47
+
48
+ ### Example
49
+ ````
50
+ "CVE","Description","KeyPhrases"
51
+ "CVE-1999-0001","ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.","['denial of service (crash or hang)']"
52
+ "CVE-1999-0002","Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.","['buffer overflow', 'root access']"
53
+ "CVE-1999-0003","Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).","['buffer overflow', 'execute commands']"
54
+
55
+ ````
56
+
57
+ ### Distribution
58
+ The Top 100 KeyPhrases (by total count of instances across all CVEs)
59
+ * Many of these KeyPhrases are different ways of expressing the same thing e.g. "cross-site scripting (xss)", "cross site scripting (xss)", "xss",...
60
+
61
+
62
+ <center>
63
+ <img src="./distribution.png">
64
+ </center>
65
+
66
+ ## Citation
67
+ ````
68
+ @software{,
69
+ author = {Chris Madden,
70
+ title = {{CVE_KeyPhrases}: A dataset of published CVE IDs and Descriptions with the Key Risk Phrases},
71
+ month = {April},
72
+ year = {2024},
73
+ url = {https://huggingface.co/yahoo-inc/datasets/CVE_KeyPhrases}
74
+ }
75
+ ````
data-00000-of-00001.arrow ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:632ce46f2aa82930156f97dbb5d86affed73ad835093bf0c6cdc917ca0d443e9
3
+ size 89913848
dataset_info.json ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "citation": "",
3
+ "description": "",
4
+ "features": {
5
+ "CVE": {
6
+ "dtype": "string",
7
+ "_type": "Value"
8
+ },
9
+ "Description": {
10
+ "dtype": "string",
11
+ "_type": "Value"
12
+ },
13
+ "KeyPhrases": {
14
+ "dtype": "string",
15
+ "_type": "Value"
16
+ }
17
+ },
18
+ "homepage": "",
19
+ "license": ""
20
+ }
distribution.png ADDED

Git LFS Details

  • SHA256: 3758bf3efa9711c7ab02e6e9c318fec2db92f2791f68629585a23f38108937d9
  • Pointer size: 131 Bytes
  • Size of remote file: 292 kB
state.json ADDED
@@ -0,0 +1,13 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "_data_files": [
3
+ {
4
+ "filename": "data-00000-of-00001.arrow"
5
+ }
6
+ ],
7
+ "_fingerprint": "f28c6882fc46d3a3",
8
+ "_format_columns": null,
9
+ "_format_kwargs": {},
10
+ "_format_type": null,
11
+ "_output_all_columns": false,
12
+ "_split": null
13
+ }
wizard_impact.jpeg ADDED

Git LFS Details

  • SHA256: 24e0d4f540f59df649388827b83f646cef35ee2b104446a96b291ceec42eb336
  • Pointer size: 131 Bytes
  • Size of remote file: 332 kB