Detailed Information

Cited 1 time in webofscience Cited 3 time in scopus
Metadata Downloads

Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Gyeongmin-
dc.contributor.authorLee, Chanhee-
dc.contributor.authorJo, Jaechoon-
dc.contributor.authorLim, Heuiseok-
dc.date.accessioned2021-08-30T13:02:07Z-
dc.date.available2021-08-30T13:02:07Z-
dc.date.created2021-06-18-
dc.date.issued2020-10-
dc.identifier.issn1868-8071-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/52665-
dc.description.abstractCountless cyber threat intelligence (CTI) reports are used by companies around the world on a daily basis for security reasons. To secure critical cybersecurity information, analysts and individuals should accordingly analyze information on threats and vulnerabilities. However, analyzing such overwhelming volumes of reports requires considerable time and effort. In this study, we propose a novel approach that automatically extracts core information from CTI reports using a named entity recognition (NER) system. During the process of constructing our proposed NER system, we defined meaningful keywords in the security domain as entities, including malware, domain/URL, IP address, Hash, and Common Vulnerabilities and Exposures. Furthermore, we linked these keywords with the words extracted from the text data of the report. To achieve a higher performance, we utilized the character-level feature vector as an input to bidirectional long-short-term memory using a conditional random field network. We finally achieved an average F1-score of 75.05%. We release 498,000 tag datasets created during our research.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER HEIDELBERG-
dc.titleAutomatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Heuiseok-
dc.identifier.doi10.1007/s13042-020-01122-6-
dc.identifier.scopusid2-s2.0-85085090748-
dc.identifier.wosid000530236500001-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, v.11, no.10, pp.2341 - 2355-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS-
dc.citation.titleINTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS-
dc.citation.volume11-
dc.citation.number10-
dc.citation.startPage2341-
dc.citation.endPage2355-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorCybersecurity-
dc.subject.keywordAuthorVulnerability-
dc.subject.keywordAuthorCyber threat intelligence-
dc.subject.keywordAuthorNamed entity recognition-
dc.subject.keywordAuthorBidirectional long-short-term memory conditional random field-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE