RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

05/07/2019
by   Aditya Pingle, et al.
0

Security Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a significant difference in their ability to detect attacks. Open source threat intelligence sources, like text descriptions about cyber-attacks, can be stored in a structured fashion in a cybersecurity knowledge graph. A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried. A semantic triple contains two cybersecurity entities with a relationship between them. In this work, we propose a system to create semantic triples over cybersecurity text, using deep learning approaches to extract possible relationships. We use the set of semantic triples generated through our system to assert in a cybersecurity knowledge graph. Security Analysts can retrieve this data from the knowledge graph, and use this information to form a decision about a cyber-attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2022

ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management

Despite the increased adoption of open-source cyber threat intelligence ...
research
08/01/2018

Cognitive Techniques for Early Detection of Cybersecurity Events

The early detection of cybersecurity events such as attacks is challengi...
research
04/10/2022

A review of knowledge graph application scenarios in cyber security

Facing the dynamic complex cyber environments, internal and external cyb...
research
05/03/2023

On the Security Risks of Knowledge Graph Reasoning

Knowledge graph reasoning (KGR) – answering complex logical queries over...
research
09/08/2021

Knowledge mining of unstructured information: application to cyber-domain

Cyber intelligence is widely and abundantly available in numerous open o...
research
12/16/2021

A Deep Learning Approach for Ontology Enrichment from Unstructured Text

Information Security in the cyber world is a major cause for concern, wi...
research
02/08/2021

OntoEnricher: A Deep Learning Approach for Ontology Enrichment from Unstructured Text

Information Security in the cyber world is a major cause for concern, wi...

Please sign up or login with your details

Forgot password? Click here to reset