A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities

被引:1
|
作者
Li, Zhihua [1 ]
Yu, Xinye [1 ]
Zhao, Yukai [1 ]
机构
[1] Jiangnan Univ, Wuxi, Peoples R China
关键词
Cybersecurity Threat Intelligence; Fake Threat Intelligence Generation; Data Mining Algorithm;
D O I
10.4018/IJSWIS.350095
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the challenges of inadequate classification accuracy in existing fake cybersecurity threat intelligence mining methods and the lack of high-quality public datasets for training classification models, we propose a novel approach that significantly advances the field. We improved the attention mechanism and designed a generative adversarial network based on the improved attention mechanism to generate fake cybersecurity threat intelligence. Additionally, we refine text tokenization techniques and design a detection model to detect fake cybersecurity threats intelligence. Using our STIX-CTIs dataset, our method achieves a remarkable accuracy of 96.1%, outperforming current text classification models. Through the utilization of our generated fake cybersecurity threat intelligence, we successfully mimic data poisoning attacks within open-source communities. When paired with our detection model, this research not only improves detection accuracy but also provides a powerful tool for enhancing the security and integrity of open-source ecosystems.
引用
收藏
页数:22
相关论文
共 50 条
  • [22] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720
  • [23] On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
    Tundis, Andrea
    Ruppert, Samuel
    Muehlhaeuser, Max
    COMPUTATIONAL SCIENCE - ICCS 2020, PT II, 2020, 12138 : 453 - 467
  • [24] Cyber Threat Intelligence Architecture for Applied Cybersecurity Scenarios PhD Thesis Proposal in Web Science and Technology
    Rosa, Ivo
    Batista, Ricardo
    Goncalves, Ramiro
    Martins, Jose
    Branco, Frederico
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [25] Controlling open source intermediaries - a web log mining approach
    Grob, HL
    Bensberg, F
    Kaderali, F
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 233 - 242
  • [26] Using Open Source Intelligence as a Tool for Reliable Web Searching
    Rai B.K.
    Verma R.
    Tiwari S.
    SN Computer Science, 2021, 2 (5)
  • [27] Social Networks and Web Security: Implications on Open Source Intelligence
    Ansari, Fahad
    Akhlaq, Monis
    Rauf, A.
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 79 - 82
  • [28] The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats
    Vlachos, Vasileios
    Stamatiou, Yannis C.
    Tzamalis, Pantelis
    Nikoletseas, Sotiris
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 1091 - 1106
  • [29] The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats
    Vasileios Vlachos
    Yannis C. Stamatiou
    Pantelis Tzamalis
    Sotiris Nikoletseas
    International Journal of Information Security, 2022, 21 : 1091 - 1106
  • [30] A text categorisation tool for open source communities based on semantic analysis
    Martinez-Torres, M. R.
    Toral, S. L.
    Barrero, F. J.
    Gregor, D.
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2013, 32 (06) : 532 - 544