--- license: cc-by-4.0 task_categories: - token-classification language: - en tags: - cyber pretty_name: Anno CTR --- # AnnoCTR Resources This repository contains the companion material for the following publication: > Lukas Lange, Marc Müller, Ghazaleh Haratinezhad Torbati, Dragan Milchevski, Patrick Grau, Subhash Pujari, Annemarie Friedrich. **AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports.** LREC-COLING 2024. Please cite this paper if using the dataset or the code, and direct any questions to [Lukas Lange](mailto:lukas.lange@de.bosch.com). The paper can be found at the [ACL Anthology (tbd.)](https://www.aclweb.org/anthology/TODO/) or at [ArXiv](https://arxiv.org/abs/2404.07765). ## Purpose of this Software This software is a research prototype, solely developed for and published as part of the publication cited above. It will neither be maintained nor monitored in any way. ## The AnnoCTR Corpus AnnoCTR consists of 400 cyber threat reports that have been obtained from commercial CTI vendors. The reports describe threat-related information such as tactics, techniques, actors, tools, and targeted industries. The reports have been annotated by a domain expert with named entities, temporal expressions, and cybersecurity-specific concepts. The annotations include mentions of organizations, locations, industry sectors, time expressions, code snippets, hacker groups, malware, tools, tactics, and techniques. The dataset is split into three parts: train, dev, and test, with 60%, 15%, and 25% of the documents, respectively. The train set is used for model training, the dev set is used for model selection, and the test set is used for evaluation. For further information on the annotation scheme, please refer to our paper and the annotation guidelines for the [general concepts](Annotation_Guidelines_General_Layer.pdf) and [cybersecurity-specific concepts](Annotation_Guidelines_Cysec_Layer.pdf). ### Corpus File Formats This is an HF friendly dataset loader for training LLMs on the NER tags. ### Usage Example ``` from datasets import load_dataset annodb = load_dataset("priamai/AnnoCTR","all_tags",trust_remote_code=True) label_list = annodb["train"].features[f"all_tags"].feature.names ``` The letter that prefixes each `tag` indicates the token position of the entity: - `B-` indicates the beginning of an entity. - `I-` indicates a token is contained inside the same entity (for example, the `State` token is a part of an entity like `Empire State Building`). - `0` indicates the token doesn't correspond to any entity. There are 23 tags currently. ### Acknowledgements The reports have been kindly donated by [Intel471](https://intel471.com/blog}), [Lab52](https://lab52.io/blog/), the [threat intelligence division of S2 Grupo](https://s2grupo.es/), [Proofpoint](https://www.proofpoint.com/us/blog), [QuoIntelligence](https://quointelligence.eu/blog), and [ZScaler](https://www.zscaler.com/blogs/security-research). ## License The AnnoCTR corpus located in the folder [AnnoCTR](AnnoCTR) is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/) (CC-BY-SA 4.0).