A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

被引:38
作者
Qin, Ya [1 ,2 ]
Shen, Guo-wei [1 ,2 ]
Zhao, Wen-bo [1 ,2 ]
Chen, Yan-ping [1 ,2 ]
Yu, Miao [3 ]
Jin, Xin [4 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, Guiyang 550025, Guizhou, Peoples R China
[2] Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security entity; Security knowledge graph (SKG); Entity recognition; Feature template; Neural network;
D O I
10.1631/FITEE.1800520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template (FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods.
引用
收藏
页码:872 / 884
页数:13
相关论文
共 34 条
  • [21] Luo G., 2015, P 2015 C EMP METH NA, P879, DOI DOI 10.18653/V1/D15-1104
  • [22] Ma X, 2016, End-to-end Sequence Labeling via Bi-directional LSTM-CNNs
  • [23] Mikolov T., 2013, Efficient estimation of word representations in vector space
  • [24] Mikolov Tomas, 2013, P 1 INT C LEARN REPR
  • [25] Passos A, 2014, PROC 18 INT C COMPUT
  • [26] Peng N., 2015, P 2015 C EMP METH NA, P548
  • [27] Pennington J., 2014, P 2014 C EMP METH NA, P1532
  • [28] [邱泉清 Qiu Quanqing], 2013, [计算机科学, Computer Science], V40, P196
  • [29] A TUTORIAL ON HIDDEN MARKOV-MODELS AND SELECTED APPLICATIONS IN SPEECH RECOGNITION
    RABINER, LR
    [J]. PROCEEDINGS OF THE IEEE, 1989, 77 (02) : 257 - 286
  • [30] Evaluating Word Representation Features in Biomedical Named Entity Recognition Tasks
    Tang, Buzhou
    Cao, Hongxin
    Wang, Xiaolong
    Chen, Qingcai
    Xu, Hua
    [J]. BIOMED RESEARCH INTERNATIONAL, 2014, 2014