8,655 Hits in 4.9 sec

Quantifying the Significance and Relevance of Cyber-Security Text through Textual Similarity and Cyber-Security Knowledge Graph

Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
2020 IEEE Access  
We trained custom Named Entity Recognition (NER) model and constructed a Cybersecurity Knowledge Graph (CKG) to infer the subjective relevance of the cyber-security text to the user and to generate correlation  ...  We propose a novel approach to represent the relevance and significance of the cyber-security text in quantitative numbers.  ...  CYBER-SECURITY NAMED ENTITY RECOGNITION The latest trends in Named Entity Recognition (NER) has been in deep neural network architecture.  ... 
doi:10.1109/access.2020.3027321 fatcat:w5gl2avnsjbj3gpt45pl6fjxwy

Cybersecurity Named Entity Recognition using Multi-modal Ensemble Learning

Feng Yi, Bo Jiang, Lu Wang, Jianjun Wu
2020 IEEE Access  
Therefore, through the in-depth study of security entity characteristic, we propose a novel security named entity recognition model based on regular expressions and known-entity dictionary as well as conditional  ...  In order to demonstrate the effectiveness of our proposed model, extensive experiments are performed on a security text dataset collected from public security webs.  ...  RELATED WORK These studies on security named entity recognition can be fallen into two categories: rule-based and machine learningbased approaches. Next, we briefly review these works. A.  ... 
doi:10.1109/access.2020.2984582 fatcat:vi4jkk5p6zfvdii5dmeor7bfue

Big Data Analytics for Cyber Security

Pelin Angin, Bharat Bhargava, Rohit Ranchal
2019 Security and Communication Networks  
In "Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning," the authors proposed solutions by first identifying the common features in crowdsourced annotations using  ...  security in a variety of elds.  ... 
doi:10.1155/2019/4109836 fatcat:67lzxtvobjdendowq4dehvgp2y

Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM

Yong Fang, Jian Gao, Zhonglin Liu, Cheng Huang
2020 Applied Sciences  
It can aggregate a large number of network security-related events promptly and provide a source of information flow about cyber threats.  ...  In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure security.  ...  Acknowledgments: We thank those anonymous reviewers whose comments/suggestions helped improve and clarify this manuscript. Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/app10175922 fatcat:uepdptxxqrbalptiriky42xoqe

A User Identity Management System for Cybercrime Control

T. Alese, O. Owolafe, A.F. Thompson, B.K. Alese
2021 Nigerian Journal of Technology  
A simulation was run on the model for users ranging from 10 to 1000 using life wild dataset, and accuracy was found to be 98.01%.  ...  This research therefore, presents the development of a user identity management system for cybercrime control.  ...  REVIEW OF RELATED WORKS Authors in [12] worked on Cyber Crime Detection and Control using the Cyber User Identification Model.  ... 
doi:10.4314/njt.v40i1.17 fatcat:izhsh4zl5re37loand7wfry3le

A review of knowledge graph application scenarios in cyber security [article]

Kai Liu, Fei Wang, Zhaoyun Ding, Sheng Liang, Zhengfei Yu, Yun Zhou
2022 arXiv   pre-print
In the major part of this article, we conduct a comparative review of the different works that elaborate on the recent progress in the application scenarios of the cyber security knowledge graph.  ...  In this review, we provide a brief overview of the basic concepts, schema, and construction approaches for the cyber security knowledge graph.  ...  Then, the security ontology design is described as representing knowledge in the security domain. Next, our review goes to tasks of named entity recognition.  ... 
arXiv:2204.04769v1 fatcat:2fkoppbokvfsbojulewbitj2o4

Attack Analysis Framework for Cyber-Attack and Defense Test Platform

Yulu Qi, Rong Jiang, Yan Jia, Aiping Li
2020 Electronics  
The experimental results show that the analysis accuracy depends on the completeness of the cyber security knowledge graph and the precision of the detection results from security equipment.  ...  This paper proposes an attack analysis framework for cyber-attack and defense test platforms, which stores prior knowledge in a cyber security knowledge graph and attack rule base as data that can be understood  ...  Named Entity Recognition Based on CRF In the field of cyber security, although the sources of the corpus are diverse, they have the same syntactic description, and machine learning methods can be used  ... 
doi:10.3390/electronics9091413 fatcat:gz2mrlxznjcshitckhnsddxrb4

Recognizing and Extracting Cybersecurtity-relevant Entities from Text [article]

Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi
2022 arXiv   pre-print
We have created an initial unstructured CTI corpus from a variety of open sources that we are using to train and test cybersecurity entity models using the spaCy framework and exploring self-learning methods  ...  Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge  ...  Cyber analysts typically rely on both structured sources like Common Vulnerabilities and Exposures (CVE) records, as well as unstructured, free-text blogs like security vendor blogs to obtain actionable  ... 
arXiv:2208.01693v1 fatcat:nttus6v6mvfnjjiqpyonixcooq

Domain-oriented Topic Discovery Based on Features Extraction and Topic Clustering

Xiaofeng Lu, Xiao Zhou, Wenting Wang, Pietro Lio, Pan Hui
2020 IEEE Access  
This article describes a DTD-FETC system built for cyber security domain.  ...  The recall rate, accuracy and F1 value results of the DTD-FETC method applied to the cyber security dataset are all above 0.99.  ...  DOMAIN NAMED ENTITY RECOGNITION A topic is a collection of articles that tell one or more related events in chronological order around a person, place, or organization [1] .  ... 
doi:10.1109/access.2020.2994516 fatcat:2ohfx2fsr5fufkjj3r7bdhnrzq

Adversarial Active Learning for Named Entity Recognition in Cybersecurity

Tao Li, Yongjin Hu, Ankang Ju, Zhuoran Hu
2020 Computers Materials & Continua  
As the foundation for constructing cybersecurity knowledge graph, named entity recognition (NER) is required for identifying critical threat-related elements from textual cyber threat intelligence.  ...  For analysis of cyber threat intelligence, many security analysts rely on cumbersome and time-consuming manual efforts.  ...  Acknowledgement: The authors thank the editor and the reviewers for their hard work.  ... 
doi:10.32604/cmc.2020.012023 fatcat:ehobo4bc5fbqlinssyjojk3cya

Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature

Nenekazi N. P. Mkuzangwe, Zubeida C. Khan
1999 The African journal of information and communication  
In an effort to support harmonised use of cyber-threat information-sharing standards, this article provides findings from a review of the extant literature on such standards.  ...  Several cyber-threat information-sharing standards exist, but there is at present no single standard or set of standards widely adopted by organisations and by computer security incident response teams  ...  Kampanakis (2014) , based on the review of 22 standards discussed in section 3 above, advises that cyber-threat information collection and sharing be done in a systematic manner in order to mitigate privacy  ... 
doi:10.23962/10539/29191 fatcat:z3f37u6jkjhwjjeb2ja6y6in5i

European Union ∙ Cybersecurity is Gaining Momentum – NIS 2.0 is on its Way

S. Schmitz-Berndt
2021 European Data Protection Law Review  
In and suggests a further sector to be included, namely research and academic institutions 50 , arguing that they are on the one hand, heavily targeted and on the other hand, intellectual property deserves  ...  Of the catalogue of measures that entities have to observe, a new measure that needs to be mentioned is the supply chain security.  ... 
doi:10.21552/edpl/2021/4/14 fatcat:gte6mcymtna7dmx4dzbfctkos4

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

2016 Chinese Journal of Engineering Science  
Such a system can help regulate the behavior of Internet users, fight against cyber crime, build cyber power, safeguard national security and cyberspace sovereignty, and protect the privacy of Internet  ...  In addition, it also presents a 13th Five-Year Plan for cyber electronic identity management in China, detailing the development of ideas and constructive suggestions that aim to strengthen China's cyberspace  ...  In a span of about 10 years, it plans to build a cyber identity ecosystem, promote personal and organizational security, and provide efficient, easy-to-use identity solutions on the Internet.  ... 
doi:10.15302/j-sscae-2016.06.020 fatcat:64wbb64oqzgthna7wtgi3pzigy

Physical-Informatical Essence-Duality-Aware Generic Modeling of Threat Handling Processes

Yaniv Mordecai, Pathmeswaran Raju, Craig Chapman, Dov Dori
2013 2013 European Modelling Symposium  
We review a formalism based on Epistemic Logic semantics, and a modelbased framework based on Object Process Methodology, and demonstrate the applicability of our framework for generic modeling of threat  ...  The distinction between the original external entity and its representation is critical for correct modeling and realization of complex interactions of cyber-physical systems with the real world.  ...  Several studies related to PIED of model entities are concerned with precise detection of real-world events and information, especially in the fields of system safety [17] , cyber security [18] , and  ... 
doi:10.1109/ems.2013.17 dblp:conf/ems/MordecaiRCD13 fatcat:khm26or2orcxph77dvixasawxu

CTI View: APT Threat Intelligence Analysis System

Yinghai Zhou, Yi Tang, Ming Yi, Chuanyu Xi, Hai Lu, Gu Zhaoquan
2022 Security and Communication Networks  
The main work of CTI View is as follows: (1) to deal with heterogeneous CTI, a text extraction framework for threat intelligence is designed based on automated test framework, text recognition technology  ...  model based on bidirectional encoder representations from transformers (BERT) is designed to complete the entity extraction algorithm for heterogeneous threat intelligence.  ...  [35] built a named entity recognition model of BilSTM-CRF to identify named entities from tweets related to network security. Luo et al.  ... 
doi:10.1155/2022/9875199 fatcat:xziqh4qrknbvphusdc3fggyyj4
« Previous Showing results 1 — 15 out of 8,655 results