CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization

📅 2024-08-13
🏛️ arXiv.org
📈 Citations: 2
Influential: 0
📄 PDF
🤖 AI Summary
Current network threat intelligence (CTI) summarization suffers from a lack of high-quality benchmark datasets, hindering advances in factual extraction, analytical insight generation, and attack process modeling. To address this gap, we introduce CTISum—the first open-source, human-annotated benchmark dataset specifically designed for CTI summarization. CTISum comprises real-world CTI reports annotated across multiple dimensions, including a novel fine-grained “attack process summarization” subtask. We propose a three-stage collaborative annotation protocol to ensure annotation consistency and semantic fidelity. Leveraging CTISum, we systematically evaluate state-of-the-art extractive (e.g., BERTSum) and generative (e.g., BART, T5) summarization models. Results reveal significant performance limitations of current SOTA methods, confirming the task’s inherent difficulty and establishing a new evaluation standard. This work fills a critical data void in the CTI domain and lays a foundational resource for automated CTI understanding and response.

Technology Category

Application Category

📝 Abstract
Cyber Threat Intelligence (CTI) summarization task requires the system to generate concise and accurate highlights from raw intelligence data, which plays an important role in providing decision-makers with crucial information to quickly detect and respond to cyber threats in the cybersecurity domain. However, efficient techniques for summarizing CTI reports, including facts, analytical insights, attack processes, etc., have largely been unexplored, primarily due to the lack of available dataset. To this end, we present CTISum, a new benchmark for CTI summarization task. Considering the importance of attack process, a novel fine-grained subtask of attack process summarization is proposed to enable defenders to assess risk, identify security gaps, vulnerabilities, and so on. Specifically, we first design a multi-stage annotation pipeline to gather and annotate the CTI data, and then benchmark the CTISum with a collection of extractive and abstractive summarization methods. Experimental results show that current state-of-the-art models exhibit limitations when applied to CTISum, underscoring the fact that automatically producing concise summaries of CTI reports remains an open research challenge.
Problem

Research questions and friction points this paper is trying to address.

Lack of suitable datasets for CTI report summarization
Need for attack process summarization in cybersecurity
Challenges in automatic summarization of CTI reports
Innovation

Methods, ideas, or system contributions that make the work stand out.

Introduces CTISum benchmark dataset for CTI summarization
Proposes multi-stage annotation pipeline for data collection
Benchmarks extractive, abstractive, and LLMs-based summarization methods
🔎 Similar Papers
No similar papers found.
Weiwen Peng
Weiwen Peng
Zhongguancun Laboratory, Beijing, China
J
Junmei Ding
Beijing University of Posts and Telecommunications, Beijing, China
W
Wei Wang
Zhongguancun Laboratory, Beijing, China
L
Lei Cui
Zhongguancun Laboratory, Beijing, China
W
Wei Cai
Zhongguancun Laboratory, Beijing, China
Z
Zhiyu Hao
Zhongguancun Laboratory, Beijing, China
X
Xiaochun Yun
Zhongguancun Laboratory, Beijing, China