Cybersecurity entity recognition model for IoT via hierarchical attention mechanism

被引:0
作者
Wu, Chunwang [1 ,2 ]
Liu, Jiayong [1 ]
Huang, Cheng [1 ]
Li, Linxia [3 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu, Peoples R China
[3] Chengdu Univ, Sch Preclin Med, Chengdu, Peoples R China
来源
INTERNATIONAL JOURNAL OF MODERN PHYSICS C | 2025年
基金
中国国家自然科学基金;
关键词
Cybersecurity; named entity recognition; complex network; knowledge graph; hierarchical attention mechanism; SYSTEMS;
D O I
10.1142/S0129183124420130
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the current landscape, the Internet of Things (IoT) finds its utility across diverse sectors, including finance, healthcare, and beyond. However, security emerges as the principal obstacle impeding the advancement of IoT. Given the intricate nature of IoT cybersecurity, traditional security protocols fall short when addressing the unique challenges within the IoT domain. Security strategies anchored in the cybersecurity knowledge graph present a robust solution to safeguard IoT ecosystems. The foundation of these strategies lies in the intricate networks of the cybersecurity knowledge graph, with Named Entity Recognition (NER) serving as a crucial initial step in its implementation. Conventional cybersecurity entity recognition approaches IoT grapple with the complexity of cybersecurity entities, characterized by their sophisticated structures and vague meanings. Additionally, these traditional models are inadequate at discerning all the interrelations between cybersecurity entities, rendering their direct application in IoT security impractical. This paper introduces an innovative Cybersecurity Entity Recognition Model, referred to as CERM, designed to pinpoint cybersecurity entities within IoT. CERM employs a hierarchical attention mechanism that proficiently maps the interdependencies among cybersecurity entities. Leveraging these mapped dependencies, CERM precisely identifies IoT cybersecurity entities. Comparative evaluation experiments illustrate CERM's superior performance over the existing entity recognition models, marking a significant advancement in the field of IoT security.
引用
收藏
页数:15
相关论文
共 32 条
  • [1] A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
    Alex, Christin
    Creado, Giselle
    Almobaideen, Wesam
    Abu Alghanam, Orieb
    Saadeh, Maha
    [J]. COMPUTERS & SECURITY, 2023, 132
  • [2] Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
  • [3] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [4] Andrew Yevonnael, 2023, 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), P275, DOI 10.1109/ICoCICs58778.2023.10276627
  • [5] Bharadiya J., 2023, Eur. J. Tech, V7, P1, DOI DOI 10.47672/EJT.1486
  • [6] Bingjun He, 2021, 2021 IEEE 21st International Conference on Communication Technology (ICCT), P508, DOI 10.1109/ICCT52962.2021.9657857
  • [7] Chang Yu, 2023, 2023 4th International Conference on Computers and Artificial Intelligence Technology (CAIT), P233, DOI 10.1109/CAIT59945.2023.10469250
  • [8] Da Xu L., 2014, IEEE Transactions on industrial informatics, V10, P2233, DOI [DOI 10.1109/TII.2014.2300753, 10.1109/TII.2014.2300753]
  • [9] Dasgupta D., 2020, J. Def. Model. Simul, V19, P57
  • [10] CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
    Fang, Yong
    Zhang, Yuchi
    Huang, Cheng
    [J]. COMPUTER JOURNAL, 2021, 64 (08) : 1215 - 1225