OntoEnricher: A Deep Learning Approach for Ontology Enrichment from Unstructured Text

02/08/2021
by   Lalit Mohan Sanagavarapu, et al.
0

Information Security in the cyber world is a major cause for concern, with significant increase in the number of attack surfaces. Existing information on vulnerabilities, attacks, controls, and advisories available on the web provides an opportunity to represent knowledge and perform security analytics to mitigate some of the concerns. Representing security knowledge in the form of ontology facilitates anomaly detection, threat intelligence, reasoning and relevance attribution of attacks, and many more. This necessitates dynamic and automated enrichment of information security ontologies. However, existing ontology enrichment algorithms based on natural language processing and ML models have issues with the contextual extraction of concepts in words, phrases and sentences. This motivates the need for sequential Deep Learning architectures that traverse through dependency paths in text and extract embedded vulnerabilities, threats, controls, products and other security related concepts and instances from learned path representations. In the proposed approach, Bidirectional LSTMs trained on a large DBpedia dataset and Wikipedia corpus of 2.8 GB along with Universal Sentence Encoder was deployed to enrich ISO 27001 based information security ontology. The approach yielded a test accuracy of over 80% when tested with knocked out concepts from ontology and web page instances to validate the robustness.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2021

A Deep Learning Approach for Ontology Enrichment from Unstructured Text

Information Security in the cyber world is a major cause for concern, wi...
research
08/04/2023

Text2KGBench: A Benchmark for Ontology-Driven Knowledge Graph Generation from Text

The recent advances in large language models (LLM) and foundation models...
research
06/30/2023

An automated method for the ontological representation of security directives

Large documents written in juridical language are difficult to interpret...
research
05/07/2019

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Security Analysts that work in a `Security Operations Center' (SoC) play...
research
04/03/2013

Predicting Network Attacks Using Ontology-Driven Inference

Graph knowledge models and ontologies are very powerful modeling and re ...
research
07/18/2022

Towards Automated Classification of Attackers' TTPs by combining NLP with ML Techniques

The increasingly sophisticated and growing number of threat actors along...
research
11/19/2022

AiCEF: An AI-assisted Cyber Exercise Content Generation Framework Using Named Entity Recognition

Content generation that is both relevant and up to date with the current...

Please sign up or login with your details

Forgot password? Click here to reset