Upload 6 files
Browse files- README.md +75 -3
- data-00000-of-00001.arrow +3 -0
- dataset_info.json +20 -0
- distribution.png +3 -0
- state.json +13 -0
- wizard_impact.jpeg +3 -0
README.md
CHANGED
@@ -1,3 +1,75 @@
|
|
1 |
-
|
2 |
-
|
3 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
|
2 |
+
<center>
|
3 |
+
<img src="./wizard_impact.jpeg" width="600px">
|
4 |
+
<p><em>Image generated by DALL-E. </em></p>
|
5 |
+
</center>
|
6 |
+
|
7 |
+
# CVE_KeyPhrases
|
8 |
+
CVE_KeyPhrases is a dataset of published CVEs with the Key Risk Phrases (for Impact, Weakness, Attack) extracted.
|
9 |
+
|
10 |
+
* It is released under license": "[cc-by-sa-4.0](https://creativecommons.org/licenses/by-sa/4.0/)"
|
11 |
+
* Please see the BSides Dublin 2024 presentation video and deck.
|
12 |
+
|
13 |
+
The dataset includes:
|
14 |
+
* ~230K published CVEs (excluding those marked Rejected) i.e. all CVEs up to April 3 2024 NVD Published date.
|
15 |
+
* The CVE ID, Description text, and Key Risk Phrases
|
16 |
+
|
17 |
+
As of April 2024, CVE_KeyPhrases stands as the largest dataset of CVEs with extracted Key Risk Phrases with high Precision (how many retrieved items are relevant?) and Recall (how many relevant items are retrieved?).
|
18 |
+
* It's an initial release and will be improved and enriched over time.
|
19 |
+
|
20 |
+
The dataset Key Risk Phrases can be used
|
21 |
+
* directly and included with CVEs e.g. https://github.com/CVEProject/cve-schema/blob/30f59c7de92fbc77bddade302601cb500c66f718/schema/docs/cnaContainer-advanced-example.json#L20
|
22 |
+
````
|
23 |
+
"impacts": [
|
24 |
+
{
|
25 |
+
"capecId": "CAPEC-233",
|
26 |
+
"descriptions": [
|
27 |
+
{
|
28 |
+
"lang": "en",
|
29 |
+
"value": "CAPEC-233 Privilege Escalation"
|
30 |
+
}
|
31 |
+
]
|
32 |
+
}
|
33 |
+
],
|
34 |
+
````
|
35 |
+
* used to train an ML model for NER or Classification.
|
36 |
+
|
37 |
+
## Dataset Details
|
38 |
+
|
39 |
+
### Version
|
40 |
+
0.1 Initial Release
|
41 |
+
### Schema
|
42 |
+
The dataset includes 3 fields shown below:
|
43 |
+
1. CVE: string: The original CVE ID
|
44 |
+
2. Description: string: The original CVE Description with minor cleaning ( non-ascii characters and newlines removed ).
|
45 |
+
3. KeyPhrases: list of substrings: extracted from Description representing Impact, Vulnerability, Attack.
|
46 |
+
|
47 |
+
|
48 |
+
### Example
|
49 |
+
````
|
50 |
+
"CVE","Description","KeyPhrases"
|
51 |
+
"CVE-1999-0001","ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.","['denial of service (crash or hang)']"
|
52 |
+
"CVE-1999-0002","Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.","['buffer overflow', 'root access']"
|
53 |
+
"CVE-1999-0003","Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).","['buffer overflow', 'execute commands']"
|
54 |
+
|
55 |
+
````
|
56 |
+
|
57 |
+
### Distribution
|
58 |
+
The Top 100 KeyPhrases (by total count of instances across all CVEs)
|
59 |
+
* Many of these KeyPhrases are different ways of expressing the same thing e.g. "cross-site scripting (xss)", "cross site scripting (xss)", "xss",...
|
60 |
+
|
61 |
+
|
62 |
+
<center>
|
63 |
+
<img src="./distribution.png">
|
64 |
+
</center>
|
65 |
+
|
66 |
+
## Citation
|
67 |
+
````
|
68 |
+
@software{,
|
69 |
+
author = {Chris Madden,
|
70 |
+
title = {{CVE_KeyPhrases}: A dataset of published CVE IDs and Descriptions with the Key Risk Phrases},
|
71 |
+
month = {April},
|
72 |
+
year = {2024},
|
73 |
+
url = {https://huggingface.co/yahoo-inc/datasets/CVE_KeyPhrases}
|
74 |
+
}
|
75 |
+
````
|
data-00000-of-00001.arrow
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:632ce46f2aa82930156f97dbb5d86affed73ad835093bf0c6cdc917ca0d443e9
|
3 |
+
size 89913848
|
dataset_info.json
ADDED
@@ -0,0 +1,20 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"citation": "",
|
3 |
+
"description": "",
|
4 |
+
"features": {
|
5 |
+
"CVE": {
|
6 |
+
"dtype": "string",
|
7 |
+
"_type": "Value"
|
8 |
+
},
|
9 |
+
"Description": {
|
10 |
+
"dtype": "string",
|
11 |
+
"_type": "Value"
|
12 |
+
},
|
13 |
+
"KeyPhrases": {
|
14 |
+
"dtype": "string",
|
15 |
+
"_type": "Value"
|
16 |
+
}
|
17 |
+
},
|
18 |
+
"homepage": "",
|
19 |
+
"license": ""
|
20 |
+
}
|
distribution.png
ADDED
Git LFS Details
|
state.json
ADDED
@@ -0,0 +1,13 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"_data_files": [
|
3 |
+
{
|
4 |
+
"filename": "data-00000-of-00001.arrow"
|
5 |
+
}
|
6 |
+
],
|
7 |
+
"_fingerprint": "f28c6882fc46d3a3",
|
8 |
+
"_format_columns": null,
|
9 |
+
"_format_kwargs": {},
|
10 |
+
"_format_type": null,
|
11 |
+
"_output_all_columns": false,
|
12 |
+
"_split": null
|
13 |
+
}
|
wizard_impact.jpeg
ADDED
Git LFS Details
|