HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence

被引:0
|
作者
Yue, HuanZhou [1 ]
Wang, XuRen [1 ]
Chen, Rong [1 ]
Jiang, ZhengWei [2 ,3 ]
Fu, YuXia [2 ,3 ]
Jiang, Jun [2 ,3 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100085, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
来源
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024 | 2024年 / 14888卷
关键词
Cyber Threat Intelligence; Knowledge Graph; Entity relationship triplet; Network Security;
D O I
10.1007/978-981-97-5489-2_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The construction of the network threat intelligence Knowl-edge graph requires a large number of entity relationship triplets, and the open network threat intelligence data set is relatively scarce; Meanwhile, the existing triplet extraction models use traditional pipeline models and cannot share parameters. In response to the above issues, this article constructs a publicly available dataset and proposes the triplet joint extraction model HRTC. HRTC uses XLnet for embedding expression and BiGRU for decoding. The experimental results show that compared with existing joint extraction models, the performance of the baseline model is superior in accuracy, recall, and F1 value. HRTC experiments on universal datasets have shown that it still performs best when dealing with large-scale datasets.
引用
收藏
页码:214 / 223
页数:10
相关论文
共 50 条
  • [31] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [32] Cyber Threat Intelligence meets the Analytic Tradecraft
    Bjurling, Bjoern
    Raza, Shahid
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [33] A Shared Cyber Threat Intelligence Solution for SMEs
    van Haastrecht, Max
    Golpur, Guy
    Tzismadia, Gilad
    Kab, Rolan
    Priboi, Cristian
    David, Dumitru
    Racataian, Adrian
    Brinkhuis, Matthieu
    Spruit, Marco
    ELECTRONICS, 2021, 10 (23)
  • [34] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [35] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
  • [36] On the dissemination of Cyber Threat Intelligence through Hyperledger
    Moubarak, Joanna
    Bassil, Carole
    Antoun, Joe
    2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [37] Measuring and visualizing cyber threat intelligence quality
    Schlette, Daniel
    Boehm, Fabian
    Caselli, Marco
    Pernul, Guenther
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 21 - 38
  • [38] CTIoT: A Cyber Threat Intelligence Tool for IoT
    El Jaouhari, Saad
    Ahmed, Shaikh
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1483 - 1489
  • [39] A New Network Model for Cyber Threat Intelligence Sharing Using Blockchain Technology
    Homan, Daire
    Shiel, Ian
    Thorpe, Christina
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [40] Measuring and visualizing cyber threat intelligence quality
    Daniel Schlette
    Fabian Böhm
    Marco Caselli
    Günther Pernul
    International Journal of Information Security, 2021, 20 : 21 - 38