Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Future Internet  /  Vol: 13 Par: 2 (2021)  /  Artículo
ARTÍCULO
TITULO

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion

Tianfang Sun    
Pin Yang    
Mengming Li and Shan Liao    

Resumen

With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence, handle emergency events, and even confront the advanced persistent threats. However, due to the explosive growth of information shared on multi-type OSTIPs, manually collecting the CTI has had low efficiency. Articles published on the OSTIPs are unstructured, leading to an imperative challenge to automatically gather CTI records only through natural language processing (NLP) methods. To remedy these limitations, this paper proposes an automatic approach to generate the CTI records based on multi-type OSTIPs (GCO), combing the NLP method, machine learning method, and cybersecurity threat intelligence knowledge. The experiment results demonstrate that the proposed GCO outperformed some state-of-the-art approaches on article classification and cybersecurity intelligence details (CSIs) extraction, with accuracy, precision, and recall all over 93%; finally, the generated records in the Neo4j-based CTI database can help reveal malicious threat groups.

 Artículos similares

       
 
Litao Han, Hu Qiao, Zeyu Li, Mengfan Liu and Pengfei Zhang    
Indoor space information is the basis of indoor location services such as indoor navigation, path planning, emergency evacuation, etc. Focusing on indoor navigation needs, this paper proposes a fast construction algorithm for a complex indoor space topol... ver más

 
Jing Jia, Jieya Gao, Weixin Wang, Ling Ma, Junda Li and Zijing Zhang    
Revista: Buildings

 
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ    
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da... ver más

 
Vsevolod Moreido, Boris Gartsman, Dimitri P. Solomatine and Zoya Suchilina    
With more machine learning methods being involved in social and environmental research activities, we are addressing the role of available information for model training in model performance. We tested the abilities of several machine learning models for... ver más
Revista: Water

 
Hongkai Ren, Xi Mao, Weijun Ma, Jizhou Wang and Linyun Wang    
In recent years, with increasing international communication and cooperation, the consensus of toponymic information among different countries has become increasingly important. A large number of English geographical names are in urgent need of translati... ver más