Research Article
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning
Table 3
The number of sentences regarding to different techniques in CTI reports.
| Techniques | CTI | Sentences |
| Initial access | 11 | 166 | Execution | 35 | 737 | Persistence | 38 | 376 | Privilege escalation | 17 | 165 | Defense evasion | 36 | 780 | Credential access | 16 | 264 | Discovery | 22 | 1048 | Lateral movement | 14 | 308 | Collection | 13 | 386 | Command and control | 20 | 654 | Exfiltration | 6 | 58 | Impact | 15 | 194 | Total | 243 | 5136 |
|
|