An APT Event Extraction Method Based on BERT-BiGRU-CRF for APT Attack Detection

被引:10
作者
Xiang, Ga [1 ]
Shi, Chen [1 ]
Zhang, Yangsen [1 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Informat Management, Beijing 100192, Peoples R China
基金
中国国家自然科学基金;
关键词
network security; event extraction; deep learning; APT event; BERT-BiGRU-CRF;
D O I
10.3390/electronics12153349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threat (APT) seriously threatens a nation's cyberspace security. Current defense technologies are typically unable to detect it effectively since APT attack is complex and the signatures for detection are not clear. To enhance the understanding of APT attacks, in this paper, a novel approach for extracting APT attack events from web texts is proposed. First, the APT event types and event schema are defined. Secondly, an APT attack event extraction dataset in Chinese is constructed. Finally, an APT attack event extraction model based on the BERT-BiGRU-CRF architecture is proposed. Comparative experiments are conducted with ERNIE, BERT, and BERT-BiGRU-CRF models, and the results show that the APT attack event extraction model based on BERT-BiGRU-CRF achieves the highest F1 value, indicating the best extraction performance. Currently, there is seldom APT event extraction research, the work in this paper contributes a new method to Cyber Threat Intelligence (CTI) analysis. By considering the multi-stages, complexity of APT attacks, and the data source from huge credible web texts, the APT event extraction method enhances the understanding of APT attacks and is helpful to improve APT attack detection capabilities.
引用
收藏
页数:15
相关论文
共 50 条
[41]   A New Intrusion Detection Method Based on Adaptive Feature Extraction [J].
Wu, Ya-Li ;
Li, Guo-Ting ;
Fu, Yu-Long ;
Wang, Xiao-Peng .
PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, :8643-8648
[42]   Interpretable deep learning method for attack detection based on spatial domain attention [J].
Liu, Hongyu ;
Lang, Bo ;
Chen, Shaojie ;
Yuan, Mengyang .
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
[43]   A DDoS Attack Detection Method Based on Information Entropy and Deep Learning in SDN [J].
Wang, Lu ;
Liu, Ying .
PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, :1084-1088
[44]   Network intrusion detection method based on deep learning feature extraction [J].
Song Y. ;
Hou B. ;
Cai Z. .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (02) :115-120
[45]   Detection Method for Tolerable False Data Injection Attack Based on Deep Learning Framework [J].
He, Sizhe ;
Zhou, Yadong ;
Lv, Xiaoliang ;
Chen, Wei .
2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, :6717-6721
[46]   Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine [J].
Imamverdiyev, Yadigar ;
Abdullayeva, Fargana .
BIG DATA, 2018, 6 (02) :159-169
[47]   Important Events Extraction Based on Event Co-occurrence Network Text Representation Method [J].
Liao, Tao ;
Xuan, Xiaoxing ;
Liu, Zongtian ;
Zhang, Xujie .
PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, :37-41
[48]   A dynamic MLP-based DDoS attack detection method using feature selection and feedback [J].
Wang, Meng ;
Lu, Yiqin ;
Qin, Jiancheng .
COMPUTERS & SECURITY, 2020, 88 (88)
[49]   Pattern lock screen detection method based on lightweight deep feature extraction [J].
Ertam, Fatih ;
Yakut, Omer Faruk ;
Tuncer, Turker .
NEURAL COMPUTING & APPLICATIONS, 2023, 35 (02) :1549-1567
[50]   Research on Railway Track Extraction Method Based on Edge Detection and Attention Mechanism [J].
Weng, Yanbin ;
Huang, Xiaobin ;
Chen, Xiahu ;
He, Jing ;
Li, Zuochuang ;
Yi, Hao .
IEEE ACCESS, 2024, 12 :26550-26561