Analysis and Parsing of Unstructured Cyber-Security Incident Data

被引:1
|
作者
Ochoa, Armando J. [1 ]
Finlayson, Mark A. [1 ]
机构
[1] Florida Int Univ, Miami, FL 33199 USA
关键词
Cyber-security; Information Extraction; Natural Language Processing; VERIS;
D O I
10.1145/3317549.3326324
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The latest threat intelligence platforms use structured protocols to share and analyze cyber-security data. However, most of this data is reported to the platform in the form of unstructured text such as social media posts, emails, and news articles, which then require manual conversion to structured form. In order to bridge the gap between unstructured and structured data, we propose to implement a natural-language-processing-(NLP)-based information extraction (IE) system that takes texts within the cyber-security domain and parses them into structured format. Our approach targets the VERIS format and makes use of the VERIS Community Database as a source of unstructured texts-primarily consisting of news articles-and their structured counterparts (VERIS reports). We propose first to use a supervised machine learning (ML) classifier to discriminate between cyber-related and non-cyber-related texts, and then to use ML classifiers decide which VERIS parameters are relevant in a given text. Then, we propose to use NLP and IE techniques to extract tuples of grammatically co-dependent words. Finally, these tuples will be passed to a domain-and field-specific IE components to fill in different fields of an output VERIS report.
引用
收藏
页码:345 / 346
页数:2
相关论文
共 50 条
  • [1] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [2] Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST)
    Kaneko, Tomoko
    Yoshioka, Nobukazu
    Sasaki, Ryoichi
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 806 - 815
  • [3] Envisioning a Cyber-Security Incident Managed Campus Environment
    Thorpe, Sean
    Jarrett, Julian
    Grandison, Tyrone
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 307 - 309
  • [4] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    [J]. ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [5] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [8] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [9] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [10] Moving to analysis-led cyber-security
    Maisey, Martin
    [J]. Network Security, 2014, 2014 (05) : 5 - 12