An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning

被引:0
|
作者
Venckauskas, Algimantas [1 ]
Toldinas, Jevgenijus [1 ]
Morkevicius, Nerijus [1 ]
Sanfilippo, Filippo [2 ]
机构
[1] Kaunas Univ Technol, Dept Comp Sci, LT-44249 Kaunas, Lithuania
[2] Univ Agder UiA, Dept Engn Sci, N-4879 Grimstad, Norway
关键词
cyber threat intelligence; email; domain ontology; machine learning;
D O I
10.3390/electronics13142716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Email is an excellent technique for connecting users at low cost. Spam emails pose the risk of collecting a user's personal information by fooling them into clicking on a link or engaging in other fraudulent activities. Furthermore, when a spam message is delivered, the user may read the entire message before deciding it is spam and deleting it. Most approaches to email classification proposed by other authors use natural language processing (NLP) methods to analyze the content of email messages. One of the biggest shortcomings of NLP-based methods is their dependence on the language in which a message is written. To construct an effective email cyber threat intelligence (CTI) sharing framework, the privacy of a message's content must be preserved. This article proposes a novel domain-specific ontology and method for emails that require only the metadata of email messages to be shared to preserve their privacy, making them applicable to solutions for sharing email CTI. To preserve privacy, a new semantic parser was developed for the proposed email domain-specific ontology to populate email metadata and create a dataset. Machine learning algorithms were examined, and experiments were conducted to identify and classify spam messages using the newly created dataset. Feature-ranking algorithms, chi-squared, ANOVA (analysis of variance), and Kruskal-Wallis tests were used. In all experiments, the kernel na & iuml;ve Bayes model demonstrated acceptable results. The highest accuracy of 92.28% and an F1 score of 95.92% for recognizing spam email messages were obtained using the proposed domain-specific ontology, the newly developed semantic parser, and the created metadata dataset.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    PROCESSES, 2022, 10 (12)
  • [2] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159
  • [3] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
    Merah, Yazid
    Kenaza, Tayeb
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [4] Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
    Ejaz, Sarwat
    Noor, Umara
    Rashid, Zahid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (02) : 96 - 113
  • [5] Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning
    Xiao P.
    Journal of Cyber Security and Mobility, 2024, 13 (01): : 53 - 90
  • [6] NER in Cyber Threat Intelligence Domain Using Transformer with TSGL
    Huang, Yuhuang
    Su, Mang
    Xu, Yuting
    Liu, Tian
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (12)
  • [7] CAVeCTIR: Matching Cyber Threat Intelligence Reports on Connected and Autonomous Vehicles Using Machine Learning
    Raptis, George E.
    Katsini, Christina
    Alexakos, Christos
    Kalogeras, Athanasios
    Serpanos, Dimitrios
    APPLIED SCIENCES-BASEL, 2022, 12 (22):
  • [8] Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning
    Kadoguchi, Masashi
    Hayashi, Shota
    Hashimoto, Masaki
    Otsuka, Akira
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 200 - 202
  • [9] Data Collection and Exploratory Analysis for Cyber Threat Intelligence Machine Learning Processes
    Wolf, Shaya
    Foster, Rita
    Mack, Andrea
    Priest, Zachary
    Haile, Jed
    2022 9TH SWISS CONFERENCE ON DATA SCIENCE (SDS), 2022, : 7 - 12
  • [10] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59