Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network
- Authors
- Kim, Gyeongmin; Lee, Chanhee; Jo, Jaechoon; Lim, Heuiseok
- Issue Date
- 10월-2020
- Publisher
- SPRINGER HEIDELBERG
- Keywords
- Cybersecurity; Vulnerability; Cyber threat intelligence; Named entity recognition; Bidirectional long-short-term memory conditional random field
- Citation
- INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, v.11, no.10, pp.2341 - 2355
- Indexed
- SCIE
SCOPUS
- Journal Title
- INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS
- Volume
- 11
- Number
- 10
- Start Page
- 2341
- End Page
- 2355
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/52665
- DOI
- 10.1007/s13042-020-01122-6
- ISSN
- 1868-8071
- Abstract
- Countless cyber threat intelligence (CTI) reports are used by companies around the world on a daily basis for security reasons. To secure critical cybersecurity information, analysts and individuals should accordingly analyze information on threats and vulnerabilities. However, analyzing such overwhelming volumes of reports requires considerable time and effort. In this study, we propose a novel approach that automatically extracts core information from CTI reports using a named entity recognition (NER) system. During the process of constructing our proposed NER system, we defined meaningful keywords in the security domain as entities, including malware, domain/URL, IP address, Hash, and Common Vulnerabilities and Exposures. Furthermore, we linked these keywords with the words extracted from the text data of the report. To achieve a higher performance, we utilized the character-level feature vector as an input to bidirectional long-short-term memory using a conditional random field network. We finally achieved an average F1-score of 75.05%. We release 498,000 tag datasets created during our research.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Computer Science and Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.