Evaluating Text Augmentation for Boosting the Automatic Mapping of Vulnerability Information to Adversary Techniques

被引:1
|
作者
Gionanidis, Emmanouil [1 ]
Karvelis, Petros [2 ]
Georgoulas, George [1 ]
Stamos, Konstantinos [1 ]
Garg, Purvi [3 ]
机构
[1] DataWise Data Engn LLC, Atlanta, GA 30318 USA
[2] Univ Ioannina, Dept Informat & Telecommun, Arta, Greece
[3] Hive Pro Inc, Milpitas, CA 95035 USA
关键词
MITRE ATT&CK; security vulnerability; multi-label classification; text augmentation; transfer learning; CLASSIFICATION;
D O I
10.1109/SecDev53368.2022.00017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MITRE ATT&CK is a well known framework which provides knowledge about adversary techniques' lifecycle and the targeted platforms. This knowledge is acquired by manually mapping vulnerability information to adversary techniques. However, the amount of published vulnerabilities makes it tedious and impractical for the expert. To this end, a model is developed to automate this mapping by solving a multi-label text classification problem. That is, to assign multiple adversary techniques, i.e., labels, to a vulnerability text description. In this paper, state-of-the-art models based on neural networks are utilized to solve the mapping problem. A common issue in multi-label classification is the existence of underrepresented classes. Here, text augmentation techniques are leveraged to help the developed models confront this by increasing, explicitly or implicitly, the input information. It is experimentally demonstrated that the proposed models surpass previous state-of-the-art. Additionally, when the proposed text augmentation techniques are used performance is boosted across all metrics providing a more accurate mapping.
引用
收藏
页码:23 / 29
页数:7
相关论文
共 6 条
  • [1] EDA: Easy Data Augmentation Techniques for Boosting Performance on Text Classification Tasks
    Wei, Jason
    Zou, Kai
    2019 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING AND THE 9TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (EMNLP-IJCNLP 2019): PROCEEDINGS OF THE CONFERENCE, 2019, : 6382 - 6388
  • [2] Evaluating ontology mapping techniques: An experiment in public safety information sharing
    Kaza, Siddharth
    Chen, Hsinchun
    DECISION SUPPORT SYSTEMS, 2008, 45 (04) : 714 - 728
  • [3] Inland wetlands mapping and vulnerability assessment using an integrated geographic information system and remote sensing techniques
    Akumu, C. E.
    Henry, J.
    Gala, T.
    Dennis, S.
    Reddy, C.
    Teggene, F.
    Haile, S.
    Archer, R. S.
    GLOBAL JOURNAL OF ENVIRONMENTAL SCIENCE AND MANAGEMENT-GJESM, 2018, 4 (04): : 387 - 400
  • [4] Automatic spatiotemporal and semantic information extraction from unstructured geoscience reports using text mining techniques
    Qiu, Qinjun
    Xie, Zhong
    Wu, Liang
    Tao, Liufeng
    EARTH SCIENCE INFORMATICS, 2020, 13 (04) : 1393 - 1410
  • [5] Automatic spatiotemporal and semantic information extraction from unstructured geoscience reports using text mining techniques
    Qinjun Qiu
    Zhong Xie
    Liang Wu
    Liufeng Tao
    Earth Science Informatics, 2020, 13 : 1393 - 1410
  • [6] Using appropriate Kappa statistic in evaluating inter-rater reliability. Short communication on ?Groundwater vulnerability and contamination risk mapping of semi-arid Totko river basin, India using GIS-based DRASTIC model and AHP techniques?
    Li, Ming
    Gao, Qian
    Yu, Tianfei
    CHEMOSPHERE, 2023, 328