A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities

被引:0
|
作者
Li, Zhihua [1 ]
Yu, Xinye [1 ]
Zhao, Yukai [1 ]
机构
[1] Jiangnan Univ, Wuxi, Peoples R China
关键词
Cybersecurity Threat Intelligence; Fake Threat Intelligence Generation; Data Mining Algorithm;
D O I
10.4018/IJSWIS.350095
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the challenges of inadequate classification accuracy in existing fake cybersecurity threat intelligence mining methods and the lack of high-quality public datasets for training classification models, we propose a novel approach that significantly advances the field. We improved the attention mechanism and designed a generative adversarial network based on the improved attention mechanism to generate fake cybersecurity threat intelligence. Additionally, we refine text tokenization techniques and design a detection model to detect fake cybersecurity threats intelligence. Using our STIX-CTIs dataset, our method achieves a remarkable accuracy of 96.1%, outperforming current text classification models. Through the utilization of our generated fake cybersecurity threat intelligence, we successfully mimic data poisoning attacks within open-source communities. When paired with our detection model, this research not only improves detection accuracy but also provides a powerful tool for enhancing the security and integrity of open-source ecosystems.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Web Mining for Open Source Intelligence
    Best, Clive
    PROCEEDINGS OF THE 12TH INTERNATIONAL INFORMATION VISUALISATION, 2008, : 321 - 325
  • [2] Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
    Nunes, Eric
    Diab, Ahmad
    Gunn, Andrew
    Marin, Ericsson
    Mishra, Vineet
    Paliath, Vivin
    Robertson, John
    Shakarian, Jana
    Thart, Amanda
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 7 - 12
  • [3] Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
    Mitra, Shaswata
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3316 - 3323
  • [4] A Research and Analysis Method of Open Source Threat Intelligence Data
    Liu, Ruyue
    Zhao, Ziping
    Sun, Chengjun
    Yang, Xiaoyu
    Gong, Xiaoli
    Zhang, Jin
    DATA SCIENCE, PT 1, 2017, 727 : 352 - 363
  • [5] DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
    Wu, Susheng
    Chen, Bin
    Sun, MingXu
    Duan, Renyu
    Zhang, Qixiang
    Huang, Cheng
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 598 - 605
  • [6] Development of a Semantic-Enabled Cybersecurity Threat Intelligence Sharing Model
    Mtsweni, Jabu
    Shozi, Nobubele Angel
    Matenche, Kgwadi
    Mutemwa, Muyowa
    Mkhonto, Njabulo
    van Vuuren, Joey Jansen
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 244 - 252
  • [7] Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web
    Grady, Nancy
    Vizenor, Lowell
    Marin, Jeanne Sappington
    Peitersen, Laura
    BIOSURVEILLANCE AND BIOSECURITY, PROCEEDINGS, 2008, 5354 : 22 - +
  • [8] On Data Licenses for Open Source Threat Intelligence
    Shim, WooChul
    Shin, Hyejin
    Hwang, Yong Ho
    IEEE SECURITY & PRIVACY, 2022, 20 (04) : 8 - 22
  • [9] Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
    Sun, Nan
    Ding, Ming
    Jiang, Jiaojiao
    Xu, Weikang
    Mo, Xiaoxing
    Tai, Yonghang
    Zhang, Jun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1748 - 1774
  • [10] CLUO: WEB-SCALE TEXT MINING SYSTEM FOR OPEN SOURCE INTELLIGENCE PURPOSES
    Maciolek, Przemyslaw
    Dobrowolski, Grzegorz
    COMPUTER SCIENCE-AGH, 2013, 14 (01): : 45 - 62