A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data

被引:0
|
作者
Demirol, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingol Univ, Dept Comp Technol, TR-12000 Bingol, Turkiye
[2] Firat Univ, Technol Fac, Dept Software Engn, TR-23119 Elazig, Turkiye
[3] Inonu Univ, Engn Fac, Dept Comp Engn, TR-44000 Malatya, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
cyber threat intelligence; knowledge graphs; named entity recognition; pre-trained language model;
D O I
10.3390/sym17040587
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As today's cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Therefore, developing methods that can rapidly extract valuable threat intelligence is a critical need to strengthen defence strategies and minimise potential damage. This paper presents an innovative approach that integrates knowledge graphs and a fine-tuned BERT-based model to analyse cyber threat intelligence (CTI) data. The proposed system extracts cyber entities such as threat actors, malware, campaigns, and targets from unstructured threat reports and establishes their relationships using an ontology-driven framework. A named entity recognition dataset was created and a BERT-based model was trained. To address the class imbalance, oversampling and a focal loss function were applied, achieving an F1 score of 96%. The extracted entities and relationships were visualised and analysed using knowledge graphs, enabling the advanced threat analysis and prediction of potential attack targets. This approach enhances cyber-attack prediction and prevention through knowledge graphs.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] A Business Process Oriented Dynamic Cyber Threat Intelligence Model
    Xu, Yuanchen
    Yang, Yingjie
    He, Ying
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 648 - 653
  • [22] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [23] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [24] Cyber Threat Intelligence meets the Analytic Tradecraft
    Bjurling, Bjoern
    Raza, Shahid
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [25] XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, K. A. Rafidha
    Rasheed, Rabeeba Abdul
    Conti, Mauro
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)
  • [26] A Shared Cyber Threat Intelligence Solution for SMEs
    van Haastrecht, Max
    Golpur, Guy
    Tzismadia, Gilad
    Kab, Rolan
    Priboi, Cristian
    David, Dumitru
    Racataian, Adrian
    Brinkhuis, Matthieu
    Spruit, Marco
    ELECTRONICS, 2021, 10 (23)
  • [27] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [28] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
  • [29] On the dissemination of Cyber Threat Intelligence through Hyperledger
    Moubarak, Joanna
    Bassil, Carole
    Antoun, Joe
    2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [30] Measuring and visualizing cyber threat intelligence quality
    Schlette, Daniel
    Boehm, Fabian
    Caselli, Marco
    Pernul, Guenther
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 21 - 38