A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data

被引:0
作者
Demirol, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingol Univ, Dept Comp Technol, TR-12000 Bingol, Turkiye
[2] Firat Univ, Technol Fac, Dept Software Engn, TR-23119 Elazig, Turkiye
[3] Inonu Univ, Engn Fac, Dept Comp Engn, TR-44000 Malatya, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
cyber threat intelligence; knowledge graphs; named entity recognition; pre-trained language model;
D O I
10.3390/sym17040587
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As today's cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Therefore, developing methods that can rapidly extract valuable threat intelligence is a critical need to strengthen defence strategies and minimise potential damage. This paper presents an innovative approach that integrates knowledge graphs and a fine-tuned BERT-based model to analyse cyber threat intelligence (CTI) data. The proposed system extracts cyber entities such as threat actors, malware, campaigns, and targets from unstructured threat reports and establishes their relationships using an ontology-driven framework. A named entity recognition dataset was created and a BERT-based model was trained. To address the class imbalance, oversampling and a focal loss function were applied, achieving an F1 score of 96%. The extracted entities and relationships were visualised and analysed using knowledge graphs, enabling the advanced threat analysis and prediction of potential attack targets. This approach enhances cyber-attack prediction and prevention through knowledge graphs.
引用
收藏
页数:27
相关论文
共 47 条
[1]   CyberEntRel: Joint extraction of cyber entities and relations using deep learning [J].
Ahmed, Kashan ;
Khurshid, Syed Khaldoon ;
Hina, Sadaf .
COMPUTERS & SECURITY, 2024, 136
[2]   A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions [J].
Ahmetoglu, Huseyin ;
Das, Resul .
INTERNET OF THINGS, 2022, 20
[3]   Analysis of Feature Selection Approaches in Large Scale Cyber Intelligence Data with Deep Learning [J].
Ahmetoglu, Huseyin ;
Das, Resul .
2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
[4]  
Alam M.T., 2022, arXiv, DOI DOI 10.48550/ARXIV.2204.05754
[5]   Processing tweets for cybersecurity threat awareness [J].
Alves, Fernando ;
Bettini, Aurelien ;
Ferreira, Pedro M. ;
Bessani, Alysson .
INFORMATION SYSTEMS, 2021, 95
[6]  
[Anonymous], 2023, ESET WeLiveSecurity
[7]   A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams [J].
Bose, Avishek ;
Behzadan, Vahid ;
Aguirre, Carlos ;
Hsu, William H. .
PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, :871-878
[8]  
CyberMonitor APT, 2023, Cyber Criminal Campaign Collections
[9]   A key review on security and privacy of big data: issues, challenges, and future research directions [J].
Demiroll, Doygun ;
Das, Resul ;
Hanbay, Davut .
SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (04) :1335-1343
[10]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171