A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data

被引:0
|
作者
Demirol, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingol Univ, Dept Comp Technol, TR-12000 Bingol, Turkiye
[2] Firat Univ, Technol Fac, Dept Software Engn, TR-23119 Elazig, Turkiye
[3] Inonu Univ, Engn Fac, Dept Comp Engn, TR-44000 Malatya, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
cyber threat intelligence; knowledge graphs; named entity recognition; pre-trained language model;
D O I
10.3390/sym17040587
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As today's cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Therefore, developing methods that can rapidly extract valuable threat intelligence is a critical need to strengthen defence strategies and minimise potential damage. This paper presents an innovative approach that integrates knowledge graphs and a fine-tuned BERT-based model to analyse cyber threat intelligence (CTI) data. The proposed system extracts cyber entities such as threat actors, malware, campaigns, and targets from unstructured threat reports and establishes their relationships using an ontology-driven framework. A named entity recognition dataset was created and a BERT-based model was trained. To address the class imbalance, oversampling and a focal loss function were applied, achieving an F1 score of 96%. The extracted entities and relationships were visualised and analysed using knowledge graphs, enabling the advanced threat analysis and prediction of potential attack targets. This approach enhances cyber-attack prediction and prevention through knowledge graphs.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence
    Yue, HuanZhou
    Wang, XuRen
    Chen, Rong
    Jiang, ZhengWei
    Fu, YuXia
    Jiang, Jun
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT V, KSEM 2024, 2024, 14888 : 214 - 223
  • [42] Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
    Venckauskas, Algimantas
    Jusas, Vacius
    Barisas, Dominykas
    Misnevs, Boriss
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [43] Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning
    Chen, Chia-Mei
    Hsu, Fang-Hsuan
    Hwang, Jenq-Neng
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 42 - 46
  • [44] Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis
    Jia, Junbo
    Yang, Li
    Wang, Yuchen
    Sang, Anyuan
    COMPUTERS & SECURITY, 2025, 149
  • [45] A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages
    Ramsdale, Andrew
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    ELECTRONICS, 2020, 9 (05)
  • [46] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    Advances in Computational Intelligence, 2023, 3 (3):
  • [47] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    COMPUTERS, 2024, 13 (03)
  • [48] Towards Selecting Informative Content for Cyber Threat Intelligence
    Panagiotou, Panos
    Iliou, Christos
    Apostolou, Konstantinos
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Chatzimisios, Periklis
    Kompatsiaris, Ioannis
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 354 - 359
  • [49] A Unified Model for Chinese Cyber Threat Intelligence Flat Entity and Nested Entity Recognition
    Yu, Jiayi
    Lu, Yuliang
    Zhang, Yongheng
    Xie, Yi
    Cheng, Mingjie
    Yang, Guozheng
    ELECTRONICS, 2024, 13 (21)
  • [50] AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
    Samtani, Sagar
    Chinn, Kory
    Larson, Cathy
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 19 - 24