Predicting Malware Attributes from Cybersecurity Texts

被引:0
|
作者
Roy, Arpita [1 ]
Park, Youngja [2 ]
Pan, Shimei [1 ]
机构
[1] Univ Maryland, Baltimore, MD USA
[2] IBM T J Watson Res Ctr, Yorktown Hts, NY USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Text analytics is a useful tool for studying malware behavior and tracking emerging threats. The task of automated malware attribute identification based on cybersecurity texts is very challenging due to a large number of malware attribute labels and a small number of training instances. In this paper, we propose a novel feature learning method to leverage diverse knowledge sources such as small amount of human annotations, unlabeled text and specifications about malware attribute labels. Our evaluation has demonstrated the effectiveness of our method over the state-of-the-art malware attribute prediction systems.
引用
收藏
页码:2857 / 2861
页数:5
相关论文
共 50 条
  • [1] Cybersecurity in Malware Research
    Lupsan, Horatiu
    Ahmed, Remaz
    Shi, Yong
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 593 - 597
  • [2] Predicting Emerging Interdisciplinary Communities with Functional Attributes of Academic Texts
    Cao Y.
    Xiang R.
    Mao J.
    Yuan D.
    Data Analysis and Knowledge Discovery, 8 (04): : 99 - 111
  • [3] Constructing Flow Graphs from Procedural Cybersecurity Texts
    Pal, Kuntal Kumar
    Kashihara, Kazuaki
    Banerjee, Pratyay
    Mishra, Swaroop
    Wang, Ruoyu
    Baral, Chitta
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL-IJCNLP 2021, 2021, : 3945 - 3957
  • [4] Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    Holt, James
    Zak, Richard
    IEEE ACCESS, 2020, 8 : 211691 - 211703
  • [5] Hidden Malware Ratchets Up Cybersecurity Risks
    Greengard, Samuel
    COMMUNICATIONS OF THE ACM, 2022, 65 (10) : 16 - 18
  • [6] Malware Multi Perspective Analytics with Auto Deduction in Cybersecurity
    Srinivasan, Sathiyandrakumar
    Deepalakshmi, P.
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1627 - 1630
  • [7] Attributes impacting cybersecurity policy development: An evidence from seven nations
    Mishra, Alok
    Alzoubi, Yehia Ibrahim
    Anwar, Memoona Javeria
    Gill, Asif Qumer
    COMPUTERS & SECURITY, 2022, 120
  • [8] "WannaCry" malware sparks fears of aerospace cybersecurity gaps
    Risen, Tom
    AEROSPACE AMERICA, 2018, 56 (05) : 8 - 8
  • [9] Towards IoT Cybersecurity Modeling: From Malware Analysis Data to IoT System Representation
    Rodriguez-Mota, A.
    Escamilla-Ambrosio, P. J.
    Happa, J.
    Nurse, J. R. C.
    2016 8TH IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2016,
  • [10] Board of directors’ attributes and aspects of cybersecurity disclosure
    Sylvie Héroux
    Anne Fortin
    Journal of Management and Governance, 2024, 28 : 359 - 404