A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data

被引:0
|
作者
Demirol, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingol Univ, Dept Comp Technol, TR-12000 Bingol, Turkiye
[2] Firat Univ, Technol Fac, Dept Software Engn, TR-23119 Elazig, Turkiye
[3] Inonu Univ, Engn Fac, Dept Comp Engn, TR-44000 Malatya, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
cyber threat intelligence; knowledge graphs; named entity recognition; pre-trained language model;
D O I
10.3390/sym17040587
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As today's cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Therefore, developing methods that can rapidly extract valuable threat intelligence is a critical need to strengthen defence strategies and minimise potential damage. This paper presents an innovative approach that integrates knowledge graphs and a fine-tuned BERT-based model to analyse cyber threat intelligence (CTI) data. The proposed system extracts cyber entities such as threat actors, malware, campaigns, and targets from unstructured threat reports and establishes their relationships using an ontology-driven framework. A named entity recognition dataset was created and a BERT-based model was trained. To address the class imbalance, oversampling and a focal loss function were applied, achieving an F1 score of 96%. The extracted entities and relationships were visualised and analysed using knowledge graphs, enabling the advanced threat analysis and prediction of potential attack targets. This approach enhances cyber-attack prediction and prevention through knowledge graphs.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] A Reference Model for Cyber Threat Intelligence (CTI) Systems
    Sakellariou, Georgios
    Fouliras, Panagiotis
    Mavridis, Ioannis
    Sarigiannidis, Panagiotis
    ELECTRONICS, 2022, 11 (09)
  • [2] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [3] Data Poisoning: Achilles Heel of Cyber Threat Intelligence Systems
    Mahlangu, Thabo
    January, Sinethemba
    Mashiane, Thulani
    Dlamini, Moses
    Ngobeni, Sipho
    Ruxwana, Nkqubela
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 221 - 230
  • [4] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [5] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [6] Automated Cyber Threat Intelligence Generation from Honeypot Data
    Sanjeev, Kumar
    Janet, B.
    Eswari, R.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 591 - 598
  • [7] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [8] Enhancing Cyber Threat Intelligence with Named Entity Recognition using BERT-CRF
    Chen, Sheng-Shan
    Hwang, Ren-Hung
    Sun, Chin-Yu
    Lin, Ying-Dar
    Pai, Tun-Wen
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7532 - 7537
  • [9] An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence
    Wu, Han
    Li, Xiaoyong
    Gao, Yali
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1370 - 1374
  • [10] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
    Husari, Ghaith
    Niu, Xi
    Chu, Bill
    Al-Shaer, Ehab
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6