Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
by
Li, Zong-Xun
, Liu, Yi-Wei
, Liu, Cheng
, Li, Yu-Jun
, Zhou, Nan-Xin
in
Alliances
/ Analysis
/ Artificial intelligence
/ Automation
/ Computational linguistics
/ Cybersecurity
/ Cyberterrorism
/ Data encryption
/ Deep learning
/ Graphs
/ Human performance
/ Insertion
/ Intelligence (information)
/ Intelligence gathering
/ Knowledge representation
/ Language
/ Language processing
/ Machine learning
/ Methods
/ Natural language interfaces
/ Natural language processing
/ Network security
/ Ontology
/ Security
/ Security software
/ Semantics
/ Threat evaluation
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
by
Li, Zong-Xun
, Liu, Yi-Wei
, Liu, Cheng
, Li, Yu-Jun
, Zhou, Nan-Xin
in
Alliances
/ Analysis
/ Artificial intelligence
/ Automation
/ Computational linguistics
/ Cybersecurity
/ Cyberterrorism
/ Data encryption
/ Deep learning
/ Graphs
/ Human performance
/ Insertion
/ Intelligence (information)
/ Intelligence gathering
/ Knowledge representation
/ Language
/ Language processing
/ Machine learning
/ Methods
/ Natural language interfaces
/ Natural language processing
/ Network security
/ Ontology
/ Security
/ Security software
/ Semantics
/ Threat evaluation
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
by
Li, Zong-Xun
, Liu, Yi-Wei
, Liu, Cheng
, Li, Yu-Jun
, Zhou, Nan-Xin
in
Alliances
/ Analysis
/ Artificial intelligence
/ Automation
/ Computational linguistics
/ Cybersecurity
/ Cyberterrorism
/ Data encryption
/ Deep learning
/ Graphs
/ Human performance
/ Insertion
/ Intelligence (information)
/ Intelligence gathering
/ Knowledge representation
/ Language
/ Language processing
/ Machine learning
/ Methods
/ Natural language interfaces
/ Natural language processing
/ Network security
/ Ontology
/ Security
/ Security software
/ Semantics
/ Threat evaluation
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
Journal Article
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present. Researchers have proposed some machine learning and deep learning models to automatically analyze these immense amounts of cyber threat intelligence. However, due to a large amount of network security terminology in CTI, these models based on open-domain corpus perform poorly in the CTI automatic analysis task. To address this problem, we propose an automatic CTI analysis method named K-CTIAA, which can extract threat actions from unstructured CTI by pre-trained models and knowledge graphs. First, the related knowledge in knowledge graphs will be supplemented to the corresponding position in CTI through knowledge query and knowledge insertion, which help the pre-trained model understand the semantics of network security terms and extract threat actions. Second, K-CTIAA reduces the adverse effects of knowledge insertion, usually called the knowledge noise problem, by introducing a visibility matrix and modifying the calculation formula of the self-attention. Third, K-CTIAA maps corresponding countermeasures by using digital artifacts, which can provide some feasible suggestions to prevent attacks. In the test data set, the F1 score of K-CTIAA reaches 0.941. The experimental results show that K-CTIAA can improve the performance of automatic threat intelligence analysis and it has certain significance for dealing with security threats.
This website uses cookies to ensure you get the best experience on our website.