A Study on Improving the Automatic Classification Performance of Cybersecurity MITRE ATT&CK Tactics Using NLP-Based ModernBERT and BERTopic Models
Abstract
1. Introduction
- We proposed a sliding window-based ModernBERT approach to process long CTRs without information loss [14].
2. Literature Review
2.1. Traditional Text Mining-Based Research
2.2. Transformer-Based Embedding Research
2.3. Topic Modelling and Hybrid Approach Research
2.4. Research Gaps and Distinctiveness of This Study
3. Methodology
3.1. Research Design Overview
3.2. Dataset and Processing
3.3. Feature Composition and Rationale
3.4. Model Structure
3.4.1. Model 1: TF-IDF + MLP
| Algorithm 1 [Model-1: Classification with TF-IDF + MLP] |
| Input: document set D (rcATT, Legoy et al., 2020 [4]), 1490 threat reports; TF-IDF vectorizer; MLP classifier; labels = MITRE ATT&CK tactics (12 classes, multi-label) Output: predicted MITRE ATT&CK tactic classes
|
- : TF-IDF vector of document
- : weights of MLP layer
- : biases of MLP layer
- : activation function (e.g., ReLU)
- : sigmoid function
- : decision threshold (default 0.5)
- : predicted label (0/1) for class c of document
- : ground-truth label
- : final output logits of the MLP
- : Binary Cross-Entropy loss
- N: total number of documents
- : set of model parameters {W, b}
3.4.2. Model 2: BERT (sliding_Window) + MLP
| Algorithm 2 [Model-2: BERT (sliding window) + MLP] |
| Input: document set D (rcATT, Legoy et al., 2020 [4]), 1490 threat reports; pretrained BERT; MLP classifier; window length L (e.g., 512 tokens), stride S (e.g., 256); labels = MITRE ATT&CK tactics (12 classes, multi-label) Output: predicted MITRE ATT&CK tactic classes
|
- : k-th sliding window of document
- : number of windows in document
- : [CLS] embedding of window from BERT
- : weights of MLP layer
- : biases of MLP layer
- : activation function (e.g., ReLU)
- : sigmoid function
- : decision threshold (default 0.5)
- : predicted label (0/1) for class c of document
3.4.3. Model 3: ModernBERT (sliding_Window) + MLP
| Algorithm 3 [Model-3: ModernBERT (sliding window) + MLP] |
| Input: document set (rcATT, Legoy et al., 2020 [4]), 1490 threat reports; pretrained ModernBERT; MLP classifier; window length (e.g., 4096 tokens), stride (e.g., 2048); labels = MITRE ATT&CK tactics (12 classes, multi-label) Output: predicted MITRE ATT&CK tactic classes
|
- : k-th sliding window of document (L = 4096, S = 2048)
- : number of windows in document
- : pooled embedding ([CLS] or mean) of window from ModernBERT
- : weights of MLP layer
- : biases of MLP layer
- : activation function (e.g., ReLU)
- : sigmoid function
- : decision threshold (default 0.5)
- : predicted label (0/1) for class c of document
3.4.4. Model 4: TF-IDF + ModernBERT (sliding_Window) + MLP
| Algorithm 4 [Model-4: TF-IDF + ModernBERT (sliding window) + MLP] |
| Input: document set (rcATT, Legoy et al., 2020 [4]), 1490 threat reports; TF-IDF vectorizer; pretrained ModernBERT; MLP classifier; window length (e.g., 4096), stride (e.g., 2048); labels = MITRE ATT&CK tactics (12 classes, multi-label) Output: predicted MITRE ATT&CK tactic classes
|
- : Binary output indicating if document i belongs to class c.
- : -th sliding window of document ( = 4096, = 2048)
- : Indicator function (1 if true, else 0).
- : Sigmoid activation converting logits to probabilities.
- : Threshold for class c (default 0.5).
- : Activation (e.g., ReLU) in hidden layers.
- : MLP weights and biases for layer .
- : TF-IDF feature vector for document .
- R: Optional projection matrix (SVD); identity if unused.
- : ModernBERT document embedding for document
- : Concatenation of TF-IDF and BERT features as MLP input.
3.4.5. Model 5: TF-IDF + BERTopic + MLP
| Algorithm 5 [Model-5: TF-IDF + BERTopic + MLP] |
| Input: document set D (rcATT, Legoy et al., 2020 [4]), 1490 threat reports; TF-IDF vectorizer; BERTopic model; MLP classifier; labels = MITRE ATT&CK tactics (12 classes, multi-label) Output: predicted MITRE ATT&CK tactic classes
|
- : TF-IDF vector of docuent
- : BERTopic-based topic vector of document (stopwords removed in preprocessing)
- : concatenated TF-IDF and BERTopic features
- : weights of the MLP layer
- : biases of the MLP layer
- : activation function (e.g., ReLU)
- : sigmoid function
- τ: decision threshold (default 0.5)
3.5. Document-Level Result Integration and Evaluation Method
3.6. Positioning of Comparative Research
4. Data Analysis and Critical Discussion
4.1. Experiment Purpose and Structure
4.2. Baseline Models for Comparison
4.3. Experimental Design of This Study
4.4. Experimental Results
4.5. Interpretation of Results
5. Conclusions and Future Work
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
| Topic | Key Keywords | Mapped Tactic | Confidence Level | Supporting Evidence |
|---|---|---|---|---|
| 0 | retrieved, discovery, execution | TA0001/2/6/7/11 | High | ‘discovery’ keyword is directly associated with reconnaissance tactics |
| 1 | malware, file, microsoft | TA0005- | Low | Generic malware keywords, Difficulty in specifying tactics |
| 2 | used, malware, file | - | Low | APT/File Context, No Explicit Tactic Indicators |
| 3 | security, cloud, kaspersky | - | Low | Security vendor–related context |
| 4 | uac, windows, dll | TA0004/5 | Medium ~High | UAC bypass → privilege escalation |
| 5 | office, macros, excel | TA0001/2/6/7/11 | High | Macro execution = initial access/execution |
| 6 | github, commit, download | TA0001/3/10 | Medium | Potential intrusion via public repositories/downloads |
| 7 | capec, attack_pattern | - | Low | Attack pattern literature |
| 8 | fireeye, fin, apt | - | Low | Vendor information |
| 9 | domain_ticket, mimikatz, kerberos | TA0001/2/6/7/11 | Very High | Mimikatz = representative tool for credential theft |
| 10 | rootkit, malware | TA0005 | High | Rootkit = detection evasion |
| 11 | connection, smb, server | TA0003/6/8 | High | SMB connection = lateral movement |
| 12 | os_malware_mac, wirulker | TA0005/TA0040 | Medium | macOS malware concealment |
| 13 | hook, process, function | TA0001/2/5/6/7/11 | High | Process hooking/injection |
| 14 | user_account_token, lsa | TA0003/6/8/14 | High | Token/LSA related = credential theft |
| 15 | task, systemd, run, schtasks | TA0003/6/8/14 | High | Scheduled tasks/systemd |
| 16 | microsoft_windows_store | - | Low | General platform keywords |
| 17 | bios, uefi, xen | TA0004/TA0003 | Medium | Firmware/Boot-Level Privilege Escalation |
| 18 | je_leuk_tweet, op, meer | - | Low | Social/noise |
| 19 | feedback_window_debugging | TA0003/5/6/7/8 | Medium | Debugging-related reconnaissance/anti-debugging |
| 20 | ddos, page, attacks | TA0040 | High | DDoS = denial of service |
| 21 | cdr, fdb, ded, fd | - | Low | File/forensic |
| 22 | sandbox, shellcrew, trojan | TA0005 | High | Sandbox evasion |
| 23 | class, windows, registry, atom | TA0003/5/6/8 | Medium | Registry manipulation |
| 24 | dga, domains, domain | TA0011 | Very High | DGA = C2 persistence |
| 25 | ads, file_ntfs, stream | TA0005 | Medium | Alternate Data Streams |
| 26 | capability_function, wintrustdll | TA0005 | Medium | WinTrust signature manipulation |
| 27 | powershell, script, hxxp | TA0001/2/6/11 | High | PowerShell execution |
| 28 | chrome, extensions, webstore | TA0001/3/10 | Medium | Intrusion/persistence via malicious extensions |
| 29 | files, file_copy, executable | TA0001/3/9/10 | Medium | File collection |
| 30 | gpo, policy, group policy | TA0003/6/8 | Medium ~High | Policy/GPO manipulation |
| 31 | psexec, remote, log register | TA0003/6/8 | Very High | PsExec = lateral movement |
| 32 | cobalt_strike, beacon | TA0011 | Very High | Cobalt Strike = C2 tool |
| 33 | html, html_help | - | Low | Formal Keywords |
| 34 | audit_yes_yes, policy | - | Low | Noise/logs |
| 35 | time_default_value, windows time | TA0003/5/6/8 | Medium | Timer-based persistence |
| 36 | domain_forest_trust | TA0001/3/4/8/10 | Medium | Abuse of forest trust |
| 37 | bits_delivery, malware_delivery_site | TA0001/3/10/11/40 | Medium | BITS job = payload/C2 |
| 38 | unix, linux, chmod | TA0002 | Medium | Unix shell execution |
References
- Peltola, S. Threat Detection Analysis Using MITRE ATT&CK Framework. Master’s Thesis, JAMK University of Applied Sciences, Jyväskylä, Finland, May 2025. Available online: https://www.theseus.fi/handle/10024/888343 (accessed on 9 October 2025).
- MITRE Corporation. MITRE ATT&CK Framework; MITRE Corporation: Bedford, MA, USA, 2024; Available online: https://attack.mitre.org (accessed on 9 October 2025).
- Arazzi, M.; Arikkat, D.R.; Nicolazzo, S.; Nocera, A.; Conti, M. NLP-Based Techniques for Cyber Threat Intelligence. Comput. Sci. Rev. 2025, 58, 100765. [Google Scholar] [CrossRef]
- Legoy, V.; Caselli, M.; Seifert, C.; Peter, A. Automated Retrieval of ATT&CK Tactics and Techniques for Cyber hreat Reports. arXiv 2020. [Google Scholar] [CrossRef]
- Lange, L.; Müller, M.; Torbati, G.H.; Milchevski, D.; Grau, P.; Pujari, S.; Friedrich, A. AnnoCTR: A Dataset for Detecting and Linking Entities, Tactics, and Techniques in Cyber Threat Reports. arXiv 2024. [Google Scholar] [CrossRef]
- Jo, H.; Lee, Y.; Shin, S. Vulcan: Automatic Extraction and Analysis of Cyber Threat Intelligence from Unstructured Text. Comput. Secur. 2022, 120, 102763. [Google Scholar] [CrossRef]
- Choi, C.; Shin, C.; Shin, S. Cyber attack group classification based on MITRE ATT&CK model. J. Internet Comput. Serv. 2022, 23, 1–13. Available online: https://www.jics.or.kr/digital-library/38235 (accessed on 9 October 2025).
- Wang, G.; Liu, P.; Huang, J.; Bin, H.; Wang, X.; Zhu, H. KnowCTI: Knowledge-Based Cyber Threat Intelligence Entity and Relation Extraction. Comput. Secur. 2024, 141, 103824. [Google Scholar] [CrossRef]
- Li, L.; Huang, C.; Chen, J. Automated Discovery and Mapping of ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence. Comput. Secur. 2024, 140, 103815. [Google Scholar] [CrossRef]
- Reeves, A.; Calic, D.; Delfabbro, P. “Generic and Unusable”: Understanding Employee Perceptions of Cybersecurity Train-ing and Measuring Advice Fatigue. Comput. Secur. 2023, 128, 103137. [Google Scholar] [CrossRef]
- Büchel, M.; Paladini, T.; Longari, S.; Carminati, M.; Zanero, S.; Binyamini, H.; Engelberg, G.; Klein, D.; Guizzardi, G.; Caselli, M.; et al. SoK: Automated TTP Extraction from CTI Reports—Are We There Yet? In Proceedings of the 34th USENIX Security Symposium (USE-NIX Security 25), Seattle, WA, USA, 13–15 August 2025; USENIX Association: Berkeley, CA, USA, 2025; pp. 4621–4641. Available online: https://conand.me/publications/buchel-cti-sok-2025.pdf (accessed on 9 October 2025).
- Devlin, J.; Chang, M.-W.; Lee, K.; Toutanova, K. BERT: Pre-Training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), Minneapolis, MN, USA, 2–7 June 2019; NAACL: Minneapolis, MN, USA, 2019. Available online: https://aclanthology.org/N19-1423/ (accessed on 9 October 2025).
- Zaheer, M.; Guruganesh, G.; Dubey, A.; Ainslie, J.; Alberti, C.; Ontañón, S.; Pham, P.; Ravula, A.; Wang, Q.; Yang, L.; et al. Big Bird: Transformers for Longer Sequences. arXiv 2020. [Google Scholar] [CrossRef]
- Warner, B.; Chaffin, A.; Clavié, B.; Weller, O.; Hallström, O.; Taghadouini, S.; Gallagher, A.; Biswas, R.; Ladhak, F.; Aarsen, T.; et al. Smarter, Better, Faster, Longer: A Modern Bidirectional Encoder for Fast, Memory Efficient, and Long Context Finetuning and Inference. arXiv 2024. [Google Scholar] [CrossRef]
- Albarrak, M.; Pergola, G.; Jhumka, A. U-BERTopic: An urgency-aware BERT-Topic modeling approach for detecting cyber-security issues via social media. In Proceedings of the First International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (NLPAICS 2024), Lancaster, UK, 29–30 July 2024; pp. 196–211. Available online: https://aclanthology.org/2024.nlpaics-1.22/ (accessed on 9 October 2025).
- Gottumukkala, D.P.; Reddy, P.V.G.D.; Rao, S.K. Topic modeling-based prediction of software defects and root cause using BERTopic, and multioutput classifier. Sci. Rep. 2025, 15, 25428. Available online: https://pmc.ncbi.nlm.nih.gov/articles/PMC12260106/ (accessed on 9 October 2025). [CrossRef] [PubMed]
- Chen, Y.; Cui, M.; Wang, D.; Cao, Y.; Yang, P.; Jiang, B.; Lu, Z.; Liu, B. A Survey of Large Language Models for Cyber Threat Detection. Comput. Secur. 2024, 145, 104016. Available online: https://www.sciencedirect.com/science/article/abs/pii/S0167404824003213 (accessed on 9 October 2025). [CrossRef]
- Center for Threat-Informed Defense. Threat Report ATT&CK Mapper (TRAM); MITRE CTID Project. 2025. Available online: https://ctid.mitre.org/projects/threat-report-attck-mapper-tram (accessed on 9 October 2025).
- Tellache, A.; Korba, A.A.; Mokhtari, A.; Moldovan, H.; Ghamri-Doudane, Y. Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence. arXiv 2025. [Google Scholar] [CrossRef]
- Branescu, I.; Grigorescu, O.; Dascalu, M. Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics. Information 2024, 15, 214. [Google Scholar] [CrossRef]
- Husari, G.; Al-Shaer, E.; Ahmed, M.; Chu, B.; Niu, X. TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. In Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 4–8 December 2017; pp. 103–115. [Google Scholar] [CrossRef]
- Sun, H.; Shu, H.; Kang, F.; Zhao, Y.; Huang, Y. Malware2ATT&CK: A Sophisticated Model for Mapping Malware to ATT&CK Techniques. Comput. Secur. 2024, 140, 103772. [Google Scholar] [CrossRef]
- Beltagy, I.; Peters, M.E.; Cohan, A. Longformer: The Long-Document Transformer. arXiv 2020. [Google Scholar] [CrossRef]
- Grootendorst, M. BERTopic: Neural Topic Modeling with a Class-Based TF-IDF Procedure. arXiv 2022. [Google Scholar] [CrossRef]
- Arreche, O.; Guntur, T.; Abdallah, M. XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems. Appl. Sci. 2024, 14, 4170. [Google Scholar] [CrossRef]
- Nugraha, B.; Jnanashree, A.V.; Bauschert, T. A Versatile XAI-based Framework for Efficient and Explainable Intrusion Detection Systems. Ann. Telecommun. 2025, 1–26. [Google Scholar] [CrossRef]
- Jaffal, N.O.; Alkhanafseh, M.; Mohaisen, D. Large Language Models in Cybersecurity: A Survey of Applications, Vulnerabilities, and Defense Techniques. AI 2025, 6, 216. [Google Scholar] [CrossRef]
- Jin, J.; Tang, B.; Ma, M.; Liu, X.; Wang, Y.; Lai, Q.; Yang, J.; Zhou, C. Crimson: Empowering strategic reasoning in cybersecurity through large language models. In Proceedings of the 2024 5th International Conference on Computer, Big Data and Artificial Intelligence (ICCBD+ AI), New York, NY, USA, 18–20 October 2024; pp. 18–24. [Google Scholar] [CrossRef]
- Xu, H.; Wang, S.; Li, N.; Wang, K.; Zhao, Y.; Chen, K.; Yu, T.; Liu, Y.; Wang, H. Large Language Models for Cyber Security: A Systematic Literature Review. arXiv 2024. [Google Scholar] [CrossRef]
- Sorokoletova, O.; Antonioni, E.; Colò, G. Towards a scalable AI-driven framework for data-independent Cyber Threat Intelligence Information Extraction. In Proceedings of the 2024 2nd International Conference on Foundation and Large Language Models (FLLM), Dubai, United Arab Emirates, 26–29 November 2024; pp. 398–406. [Google Scholar] [CrossRef]
- You, W.; Park, Y. Cyber-Attack Technique Classification Using Two-Stage Trained Large Language Models. arXiv 2024. [Google Scholar] [CrossRef]
- Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, Ł.; Polosukhin, I. Attention is All You Need. arXiv 2017. [Google Scholar] [CrossRef]
- Chan, K.-H.; Ke, W.; Im, S.-K. A General Method for Generating Discrete Orthogonal Matrices. IEEE Access 2021, 9, 120380–120391. [Google Scholar] [CrossRef]
- Castaño, F.; Gil-Lerchundi, A.; Orduna-Urrutia, R.; Fidalgo Fernandez, E.; Alaiz-Rodríguez, R. WAVE-27K: Bringing Together CTI Sources to Enhance Threat Intelligence Models. In Proceedings of the 1st International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (NLPAICS 2024), Lancaster, UK, 29–30 July 2024; pp. 119–126. Available online: https://aclanthology.org/2024.nlpaics-1.14/ (accessed on 9 October 2025).
- Simonetto, S.; Bosch, P. Comprehensive Threat Analysis and Systematic Mapping of CVEs to MITRE Framework. In Proceedings of the 1st International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (NLPAICS), Lancaster, UK, 29–30 July 2024; Available online: https://aclanthology.org/2024.nlpaics-1.4.pdf (accessed on 9 October 2025).
- Gabrys, R.; Bilinski, M.; Fugate, S.; Silva, D. Using natural language processing tools to infer adversary techniques and tactics under the Mitre ATT&CK framework. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2024; pp. 0541–0547. [Google Scholar] [CrossRef]
- Donchev, D.; Vassilev, V.; Tonchev, D. Impact of False Positives and False Negatives on Security Risks in Transactions Under Threat. In Proceedings of the 18th International Conference on Trust and Privacy in Digital Business, Linz, Austria, 27–30 September 2021; pp. 50–66. Available online: https://repository.londonmet.ac.uk/6776/ (accessed on 9 October 2025).
- Tsang, C.M.; Bell, T.; Gouglidis, A.; El-Haj, M. Deciphering Cyber Threats: A Unifying Framework with GPT-3.5, BERTopic and Feature Importance. In Proceedings of the First International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security, Lancaster, UK, 29–30 July 2024; pp. 175–185. Available online: https://aclanthology.org/2024.nlpaics-1.20/ (accessed on 9 October 2025).











| No. of Win. (MAX_LENGTH = 4096) | No. of Docs. | % | Doc. Len. (A4 p.) |
|---|---|---|---|
| 1 | 1153 | 77.38 | 8.2 |
| 2 | 178 | 11.95 | 16.4 |
| 3 | 67 | 4.5 | 24.6 |
| 4 | 41 | 2.75 | 32.8 |
| 5 | 18 | 1.21 | 40.9 |
| 6 | 15 | 1.01 | 49.1 |
| 7 | 4 | 0.27 | 57.3 |
| 8 | 5 | 0.34 | 65.5 |
| 9 | 3 | 0.2 | 73.7 |
| 11 | 1 | 0.07 | 90.1 |
| 12 | 1 | 0.07 | 98.3 |
| 13 | 1 | 0.07 | 106.4 |
| 14 | 1 | 0.07 | 114.6 |
| 16 | 2 | 0.13 | 131.0 |
| Total | 1490 | 100% |
| Tactic ID | Tactic | Description |
|---|---|---|
| TA0001 | Initial Access | Methods used by adversaries to gain an initial foothold within a network (e.g., phishing, exploiting public-facing applications). |
| TA0002 | Execution | Techniques that result in execution of adversary-controlled code on a local or remote system (e.g., PowerShell, command-line). |
| TA0003 | Persistence | Techniques that adversaries use to maintain their foothold (e.g., creating accounts, service registration, scheduled tasks). |
| TA0004 | Privilege Escalation | Techniques that allow adversaries to gain higher-level permissions (e.g., exploiting vulnerabilities, token manipulation). |
| TA0005 | Defence Evasion | Techniques used to evade detection and avoid defences (e.g., obfuscation, rootkits, timestomping). |
| TA0006 | Credential Access | Techniques for stealing credentials such as passwords, hashes, or tokens (e.g., Mimikatz, credential dumping). |
| TA0007 | Discovery | Techniques adversaries use to gain knowledge about the system and internal network (e.g., network scanning, account discovery). |
| TA0008 | Lateral Movement | Techniques that enable moving through a network (e.g., PsExec, RDP, SMB exploitation). |
| TA0009 | Collection | Techniques used to gather information relevant to the adversary’s goals (e.g., keylogging, screen capture, file collection). |
| TA0010 | Exfiltration | Techniques used to exfiltrate collected data outside the victim environment (e.g., compression + upload, FTP, HTTP POST). |
| TA0011 | Command and Control | Techniques to communicate and control compromised assets via C2 channels (e.g., Cobalt Strike, beacons, DGA). |
| TA0040 | Impact | Techniques used to disrupt, deny, degrade, or destroy business and operational processes (e.g., ransomware, wipers, DDoS). |
| Metric Avg. | Precision | Recall | F0.5 |
|---|---|---|---|
| Micro | 48.72% | 19.00% | 37.10% |
| Macro | 4.43% | 9.09% | 4.93% |
| Metric Avg. | Precision | Recall | F0.5 |
|---|---|---|---|
| Micro | 65.64% | 64.69% | 65.38% |
| Macro | 60.26% | 58.50% | 59.47% |
| Experimental Model | Configuration (Data Representation + Classifier) |
|---|---|
| Model-1 | TF-IDF + MLP |
| Model-2 | BERT + MLP |
| Model-3 | ModernBERT + MLP |
| Model-4 | TF-IDF + ModernBERT + MLP |
| Model-5 | TF-IDF + BERTopic + MLP |
| Experimental Model | Metric Avg. | Precision (%) | Imp. (%) | Recall (%) | Imp. (%) | F0.5 (%) | Imp. (%) | ||
|---|---|---|---|---|---|---|---|---|---|
| Category | Data Representation | Classifier | |||||||
| Base-line | TF-IDF | Linear SVC | Micro | 65.64 | 0.0 | 64.69 | 0.0 | 65.38 | 0.0 |
| Macro | 60.26 | 0.0 | 58.50 | 0.0 | 59.47 | 0.0 | |||
| Model-1 | TF-IDF | MLP | Micro | 66.91 | +1.93 | 61.19 | −5.41 | 65.68 | +0.46 |
| Macro | 64.78 | +7.5 | 55.80 | −4.62 | 62.15 | +4.51 | |||
| Model-2 | BERT | MLP | Micro | 65.17 | −0.72 | 60.40 | −6.63 | 64.16 | −1.87 |
| Macro | 61.77 | +2.51 | 48.38 | −17.3 | 54.15 | −8.95 | |||
| Model-3 | ModernBERT | MLP | Micro | 67.82 | +3.32 | 50.73 | −21.58 | 63.54 | −2.81 |
| Macro | 65.39 | +8.51 | 40.13 | −31.4 | 53.54 | −9.97 | |||
| Model-4 | TF-IDF + ModernBERT | MLP | Micro | 72.25 | +10.07 | 45.11 | −30.27 | 64.49 | −1.36 |
| Macro | 66.72 | +10.72 | 36.23 | −38.07 | 54.61 | −8.17 | |||
| Model-5 | TF-IDF + BERTopic | MLP | Micro | 67.51 | +2.85 | 65.69 | +1.55 | 67.14 | +2.69 |
| Macro | 66.59 | +10.5 | 57.49 | −1.73 | 63.20 | +6.27 | |||
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Baek, J.; O, J.; Jeong, S.; Kim, W. A Study on Improving the Automatic Classification Performance of Cybersecurity MITRE ATT&CK Tactics Using NLP-Based ModernBERT and BERTopic Models. Electronics 2025, 14, 4434. https://doi.org/10.3390/electronics14224434
Baek J, O J, Jeong S, Kim W. A Study on Improving the Automatic Classification Performance of Cybersecurity MITRE ATT&CK Tactics Using NLP-Based ModernBERT and BERTopic Models. Electronics. 2025; 14(22):4434. https://doi.org/10.3390/electronics14224434
Chicago/Turabian StyleBaek, Jaehwan, Jeonghoon O, Seungwoo Jeong, and Wooju Kim. 2025. "A Study on Improving the Automatic Classification Performance of Cybersecurity MITRE ATT&CK Tactics Using NLP-Based ModernBERT and BERTopic Models" Electronics 14, no. 22: 4434. https://doi.org/10.3390/electronics14224434
APA StyleBaek, J., O, J., Jeong, S., & Kim, W. (2025). A Study on Improving the Automatic Classification Performance of Cybersecurity MITRE ATT&CK Tactics Using NLP-Based ModernBERT and BERTopic Models. Electronics, 14(22), 4434. https://doi.org/10.3390/electronics14224434

