HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence

被引:0
|
作者
Yue, HuanZhou [1 ]
Wang, XuRen [1 ]
Chen, Rong [1 ]
Jiang, ZhengWei [2 ,3 ]
Fu, YuXia [2 ,3 ]
Jiang, Jun [2 ,3 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100085, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024 | 2024年 / 14888卷
关键词
Cyber Threat Intelligence; Knowledge Graph; Entity relationship triplet; Network Security;
D O I
10.1007/978-981-97-5489-2_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The construction of the network threat intelligence Knowl-edge graph requires a large number of entity relationship triplets, and the open network threat intelligence data set is relatively scarce; Meanwhile, the existing triplet extraction models use traditional pipeline models and cannot share parameters. In response to the above issues, this article constructs a publicly available dataset and proposes the triplet joint extraction model HRTC. HRTC uses XLnet for embedding expression and BiGRU for decoding. The experimental results show that compared with existing joint extraction models, the performance of the baseline model is superior in accuracy, recall, and F1 value. HRTC experiments on universal datasets have shown that it still performs best when dealing with large-scale datasets.
引用
收藏
页码:214 / 223
页数:10
相关论文
共 50 条
  • [21] Evaluation of Cyber Threat Intelligence Maturity Models: A Comparison Based on Maturity Model Design Principles
    Pambudhi, Heru Dias
    Aji, Rizal Fathoni
    2022 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBERNETICS TECHNOLOGY & APPLICATIONS (ICICYTA), 2022, : 105 - 110
  • [22] Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
    Ghaleb, Fuad A.
    Alsaedi, Mohammed
    Saeed, Faisal
    Ahmad, Jawad
    Alasli, Mohammed
    SENSORS, 2022, 22 (09)
  • [23] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [24] Cyber threat indicators extraction based on contextual knowledge prompt
    Tang, Hailiang
    Lin, Dawei
    Li, Wanyu
    Zhang, Wenxiao
    Zhao, Jun
    COMPUTER NETWORKS, 2024, 254
  • [25] Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things
    Mena, Diego Mendez
    Yang, Baijian
    IOT, 2021, 2 (01): : 1 - 16
  • [26] A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence
    Ma, Xingbang
    Yu, Dongsheng
    Du, Yanhui
    Li, Lanting
    Ni, Wenkai
    Lv, Haibin
    ELECTRONICS, 2023, 12 (11)
  • [27] AI-Based Holistic Framework for Cyber Threat Intelligence Management
    Spyros, Arnolnt
    Koritsas, Ilias
    Papoutsis, Angelos
    Panagiotou, Panos
    Chatzakou, Despoina
    Kavallieros, Dimitrios
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    IEEE ACCESS, 2025, 13 : 20820 - 20846
  • [28] A Data Mining Based System for Automating Creation of Cyber Threat Intelligence
    Arikan, Suleyman Muhammed
    Acar, Sami
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [29] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [30] Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
    Czekster, Ricardo M.
    Metere, Roberto
    Morisset, Charles
    APPLIED SCIENCES-BASEL, 2022, 12 (10):