A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities

被引:1
|
作者
Li, Zhihua [1 ]
Yu, Xinye [1 ]
Zhao, Yukai [1 ]
机构
[1] Jiangnan Univ, Wuxi, Peoples R China
关键词
Cybersecurity Threat Intelligence; Fake Threat Intelligence Generation; Data Mining Algorithm;
D O I
10.4018/IJSWIS.350095
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the challenges of inadequate classification accuracy in existing fake cybersecurity threat intelligence mining methods and the lack of high-quality public datasets for training classification models, we propose a novel approach that significantly advances the field. We improved the attention mechanism and designed a generative adversarial network based on the improved attention mechanism to generate fake cybersecurity threat intelligence. Additionally, we refine text tokenization techniques and design a detection model to detect fake cybersecurity threats intelligence. Using our STIX-CTIs dataset, our method achieves a remarkable accuracy of 96.1%, outperforming current text classification models. Through the utilization of our generated fake cybersecurity threat intelligence, we successfully mimic data poisoning attacks within open-source communities. When paired with our detection model, this research not only improves detection accuracy but also provides a powerful tool for enhancing the security and integrity of open-source ecosystems.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] CRATOR a CRAwler for TOR: Turning Dark Web Pages into Open Source INTelligence
    De Pascale, Daniel
    Cascavilla, Giuseppe
    Tamburri, Damian A.
    Van Den Heuvel, Willem Jan
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 144 - 161
  • [42] A Deep Web Complex Matching Method based on Association Mining and Semantic Clustering
    Yang Xiao-qin
    Ju Shiguang
    Cao Qinghuang
    2009 SIXTH WEB INFORMATION SYSTEMS AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2009, : 169 - 172
  • [43] A method for automatic construction of learning contents in semantic web by a text mining approach
    Yang, Hsin-Chang
    INTERNATIONAL JOURNAL OF KNOWLEDGE AND LEARNING, 2006, 2 (1-2) : 89 - 105
  • [44] A case study in business application development using open source and semantic web technologies
    Novicic, I.
    Kokovic, Z.
    Jakovljevic, N.
    Ljubicic, V.
    Bacetic, M.
    Anicic, N.
    Marjanovic, Z.
    Ivezic, N.
    ENTERPRISE INTEROPERABILITY II: NEW CHALLENGES AND APPROACHES, 2007, : 721 - 724
  • [45] Navigation support in evolving open-source communities by a web-based dashboard
    Hannemann, Anna
    Liiva, Kristjan
    Klamma, Ralf
    IFIP Advances in Information and Communication Technology, 2014, 427 : 11 - 20
  • [46] Navigation Support in Evolving Open-Source Communities by a Web-Based Dashboard
    Hannemann, Anna
    Liiva, Kristjan
    Klamma, Ralf
    OPEN SOURCE SOFTWARE: MOBILE OPEN SOURCE TECHNOLOGIES, 2014, 427 : 11 - 20
  • [47] Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
    Liao, Xiaojing
    Yuan, Kan
    Wang, XiaoFeng
    Li, Zhou
    Xing, Luyi
    Beyah, Raheem
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 755 - 766
  • [49] Open Source Software Success Measurement Method Based on Mining Software Repository
    Ning D.-J.
    Ye P.-G.
    Liu Q.
    Li M.
    2018, Chinese Institute of Electronics (46): : 2930 - 2935
  • [50] Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
    Kuo-Chan Lee
    Chih-Hung Hsieh
    Li-Jia Wei
    Ching-Hao Mao
    Jyun-Han Dai
    Yu-Ting Kuang
    Soft Computing, 2017, 21 : 2883 - 2896