A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data

被引:0
|
作者
Demirol, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingol Univ, Dept Comp Technol, TR-12000 Bingol, Turkiye
[2] Firat Univ, Technol Fac, Dept Software Engn, TR-23119 Elazig, Turkiye
[3] Inonu Univ, Engn Fac, Dept Comp Engn, TR-44000 Malatya, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
cyber threat intelligence; knowledge graphs; named entity recognition; pre-trained language model;
D O I
10.3390/sym17040587
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As today's cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Therefore, developing methods that can rapidly extract valuable threat intelligence is a critical need to strengthen defence strategies and minimise potential damage. This paper presents an innovative approach that integrates knowledge graphs and a fine-tuned BERT-based model to analyse cyber threat intelligence (CTI) data. The proposed system extracts cyber entities such as threat actors, malware, campaigns, and targets from unstructured threat reports and establishes their relationships using an ontology-driven framework. A named entity recognition dataset was created and a BERT-based model was trained. To address the class imbalance, oversampling and a focal loss function were applied, achieving an F1 score of 96%. The extracted entities and relationships were visualised and analysed using knowledge graphs, enabling the advanced threat analysis and prediction of potential attack targets. This approach enhances cyber-attack prediction and prevention through knowledge graphs.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] CTIoT: A Cyber Threat Intelligence Tool for IoT
    El Jaouhari, Saad
    Ahmed, Shaikh
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1483 - 1489
  • [32] Relation Extraction Techniques in Cyber Threat Intelligence
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, Rafidha K. A.
    Nicolazzo, Serena
    Nocera, Antonino
    Conti, Mauro
    NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS, PT I, NLDB 2024, 2024, 14762 : 348 - 363
  • [33] Measuring and visualizing cyber threat intelligence quality
    Daniel Schlette
    Fabian Böhm
    Marco Caselli
    Günther Pernul
    International Journal of Information Security, 2021, 20 : 21 - 38
  • [34] Tactics And Techniques Classification In Cyber Threat Intelligence
    Yu, Zhongkun
    Wang, JunFeng
    Tang, BinHui
    Lu, Li
    COMPUTER JOURNAL, 2023, 66 (08) : 1870 - 1881
  • [35] Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
    Jo, Hyeonseong
    Lee, Yongjae
    Shin, Seungwon
    COMPUTERS & SECURITY, 2022, 120
  • [36] On Correlating Network Traffic For Cyber Threat Intelligence: A Bloom Filter Approach
    Atifi, Adil
    Bou-Harb, Elias
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 384 - 389
  • [37] Sharing Cyber Threat Intelligence Under the General Data Protection Regulation
    Albakri, Adham
    Boiten, Eerke
    De Lemos, Rogerio
    PRIVACY TECHNOLOGIES AND POLICY, APF 2019, 2019, 11498 : 28 - 41
  • [38] A Data Mining Based System for Automating Creation of Cyber Threat Intelligence
    Arikan, Suleyman Muhammed
    Acar, Sami
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [39] Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
    Fieblinger, Romy
    Alam, Md Tanvirul
    Rastogi, Nidhi
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 100 - 111
  • [40] TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
    Zhao, Jun
    Yan, Qiben
    Li, Jianxin
    Shao, Minglai
    He, Zuti
    Li, Bo
    COMPUTERS & SECURITY, 2020, 95