• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology


Yonghyeon Park, Changhee Choi, Journal of Internet Computing and Services, Vol. 26, No. 4, pp. 9-18, Aug. 2025
10.7472/jksii.2025.26.4.9, Full Text:  HTML
Keywords: LLM, finetuning, MITRE ATT&CK, cyber attack technique

Abstract

With the rise in cyber attacks, the number of cyber threat intelligence reports analyzing these incidents has increased significantly. However, mapping the attack techniques described in these reports to MITRE ATT&CK techniques requires significant time and effort from cybersecurity experts. To automate this process, we propose the method that leverages a Large Language Model (LLM) to automatically extract MITRE ATT&CK techniques from cyber threat intelligence reports. We crawled the official MITRE ATT&CK website and manually labeled attack techniques from cyber threat intelligence reports to construct a dataset. Additionally, we conducted prompt engineering and fine-tuning on widely used LLMs, including LLaMA, Gemma, and DeepSeek, and compared their performance in TTP extraction. Experimental results showed that the proposed method extracted attack techniques from individual sentences with an accuracy of up to 61.1%. Furthermore, even after fine-tuning the model for the specific task of technique extraction, it preserved the original conversational capabilities of the LLM.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Park, Y. & Choi, C. (2025). LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology. Journal of Internet Computing and Services, 26(4), 9-18. DOI: 10.7472/jksii.2025.26.4.9.

[IEEE Style]
Y. Park and C. Choi, "LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology," Journal of Internet Computing and Services, vol. 26, no. 4, pp. 9-18, 2025. DOI: 10.7472/jksii.2025.26.4.9.

[ACM Style]
Yonghyeon Park and Changhee Choi. 2025. LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology. Journal of Internet Computing and Services, 26, 4, (2025), 9-18. DOI: 10.7472/jksii.2025.26.4.9.