HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence

被引:0
|
作者
Yue, HuanZhou [1 ]
Wang, XuRen [1 ]
Chen, Rong [1 ]
Jiang, ZhengWei [2 ,3 ]
Fu, YuXia [2 ,3 ]
Jiang, Jun [2 ,3 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100085, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024 | 2024年 / 14888卷
关键词
Cyber Threat Intelligence; Knowledge Graph; Entity relationship triplet; Network Security;
D O I
10.1007/978-981-97-5489-2_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The construction of the network threat intelligence Knowl-edge graph requires a large number of entity relationship triplets, and the open network threat intelligence data set is relatively scarce; Meanwhile, the existing triplet extraction models use traditional pipeline models and cannot share parameters. In response to the above issues, this article constructs a publicly available dataset and proposes the triplet joint extraction model HRTC. HRTC uses XLnet for embedding expression and BiGRU for decoding. The experimental results show that compared with existing joint extraction models, the performance of the baseline model is superior in accuracy, recall, and F1 value. HRTC experiments on universal datasets have shown that it still performs best when dealing with large-scale datasets.
引用
收藏
页码:214 / 223
页数:10
相关论文
共 50 条
  • [1] KnowCTI: Knowledge-based cyber threat intelligence entity and relation extraction
    Wang, Gaosheng
    Liu, Peipei
    Huang, Jintao
    Wang, Xi
    Zhu, Hongsong
    COMPUTERS & SECURITY, 2024, 141
  • [2] Relation Extraction Techniques in Cyber Threat Intelligence
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, Rafidha K. A.
    Nicolazzo, Serena
    Nocera, Antonino
    Conti, Mauro
    NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS, PT I, NLDB 2024, 2024, 14762 : 348 - 363
  • [3] CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
    Liu, Yang
    Han, Xiaohui
    Zuo, Wenbo
    Lv, Haiqing
    Guo, Jing
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2728 - 2733
  • [4] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [5] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [6] A Span-based Multivariate Information-aware Embedding Network for joint relational triplet extraction of threat intelligence
    Shang, Wenli
    Wang, Bowen
    Zhu, Pengcheng
    Ding, Lei
    Wang, Shuang
    KNOWLEDGE-BASED SYSTEMS, 2024, 295
  • [7] AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction
    Han, Yue
    Jiang, Rong
    Li, Changjian
    Huang, Yanyi
    Chen, Kai
    Yu, Han
    Li, Aiping
    Han, Weihong
    Pang, Shengnan
    Zhao, Xuechen
    ELECTRONICS, 2025, 14 (02):
  • [8] Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
    Venckauskas, Algimantas
    Jusas, Vacius
    Barisas, Dominykas
    Misnevs, Boriss
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [9] Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
    Chen, Bin
    Li, Hongyi
    Zhao, Di
    Yang, Yitang
    Pan, Chengwei
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [10] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519