Kashan Ahmed
CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning
Ahmed, Kashan; Khurshid, Syed Khaldoon; Hina, Sadaf
Authors
Abstract
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two entities associated with one relation. The main problem is that the CTI data is increasing more rapidly than expected and existing techniques are becoming ineffective for extracting the CTI information. This work mainly focuses on the extraction of cyber relation triples in an effective way using the joint extraction technique, which resolves the issues in the classical pipeline technique. Firstly, the ‘BIEOS’ tagging scheme was applied to CTI data using the joint tagging technique and then the relation triples were jointly extracted. This study utilized the attention-based RoBERTa-BiGRU-CRF model for sequential tagging. Finally, the relation triples were extracted using the relation-matching technique after matching the best suitable relation for the two predicted entities. The experimental results showed that this technique outperformed the state-of-the-art models in knowledge triple extraction on CTI data. Furthermore, a 7% increase in the F1 score also proved the effectiveness of this technique for the information extraction task on CTI data.
Citation
Ahmed, K., Khurshid, S. K., & Hina, S. (2024). CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning. Computers and Security, 136, 103579. https://doi.org/10.1016/j.cose.2023.103579
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 30, 2023 |
Online Publication Date | Nov 8, 2023 |
Publication Date | 2024-01 |
Deposit Date | Nov 24, 2023 |
Publicly Available Date | Nov 27, 2023 |
Journal | Computers & Security |
Print ISSN | 0167-4048 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 136 |
Pages | 103579 |
DOI | https://doi.org/10.1016/j.cose.2023.103579 |
Keywords | Cyber Threat Intelligence; Deep Learning; Named Entity Recognition; Relation Extraction; Knowledge Graph |
Files
Published Version
(1.7 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Agentless approach for security information and event management in industrial IoT
(2023)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search