Research Article
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning
Table 3
The number of sentences regarding to different techniques in CTI reports.
| | Techniques | CTI | Sentences |
| | Initial access | 11 | 166 | | Execution | 35 | 737 | | Persistence | 38 | 376 | | Privilege escalation | 17 | 165 | | Defense evasion | 36 | 780 | | Credential access | 16 | 264 | | Discovery | 22 | 1048 | | Lateral movement | 14 | 308 | | Collection | 13 | 386 | | Command and control | 20 | 654 | | Exfiltration | 6 | 58 | | Impact | 15 | 194 | | Total | 243 | 5136 |
|
|