Knowledge mining of unstructured information: application to cyber-domain

09/08/2021
by   Tuomas Takko, et al.
45

Cyber intelligence is widely and abundantly available in numerous open online sources with reports on vulnerabilities and incidents. This constant stream of noisy information requires new tools and techniques if it is to be used for the benefit of analysts and investigators in various organizations. In this paper we present and implement a novel knowledge graph and knowledge mining framework for extracting relevant information from free-form text about incidents in the cyber domain. Our framework includes a machine learning based pipeline as well as crawling methods for generating graphs of entities, attackers and the related information with our non-technical cyber ontology. We test our framework on publicly available cyber incident datasets to evaluate the accuracy of our knowledge mining methods as well as the usefulness of the framework in the use of cyber analysts. Our results show analyzing the knowledge graph constructed using the novel framework, an analyst can infer additional information from the current cyber landscape in terms of risk to various entities and the propagation of risk between industries and countries. Expanding the framework to accommodate more technical and operational level information can increase the accuracy and explainability of trends and risk in the knowledge graph.

READ FULL TEXT

page 7

page 8

page 10

page 11

research
12/20/2022

ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management

Despite the increased adoption of open-source cyber threat intelligence ...
research
02/10/2021

Malware Knowledge Graph Generation

Cyber threat and attack intelligence information are available in non-st...
research
05/07/2019

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Security Analysts that work in a `Security Operations Center' (SoC) play...
research
08/02/2022

Recognizing and Extracting Cybersecurtity-relevant Entities from Text

Cyber Threat Intelligence (CTI) is information describing threat vectors...
research
08/01/2018

Cognitive Techniques for Early Detection of Cybersecurity Events

The early detection of cybersecurity events such as attacks is challengi...
research
04/02/2023

Graph Mining for Cybersecurity: A Survey

The explosive growth of cyber attacks nowadays, such as malware, spam, a...
research
04/23/2021

A Framework for Unsupervised Classificiation and Data Mining of Tweets about Cyber Vulnerabilities

Many cyber network defense tools rely on the National Vulnerability Data...

Please sign up or login with your details

Forgot password? Click here to reset