RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

dc.contributor.authorPingle, Aditya
dc.contributor.authorPiplai, Aritran
dc.contributor.authorMittal, Sudip
dc.contributor.authorJoshi, Anupam
dc.contributor.authorHolt, James
dc.contributor.authorZak, Richard
dc.date.accessioned2019-06-11T18:12:13Z
dc.date.available2019-06-11T18:12:13Z
dc.date.issued2019-05-16
dc.description.abstractSecurity Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a significant difference in their ability to detect attacks. Open source threat intelligence sources, like text descriptions about cyber-attacks, can be stored in a structured fashion in a cybersecurity knowledge graph. A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried. A semantic triple contains two cybersecurity entities with a relationship between them. In this work, we propose a system to create semantic triples over cybersecurity text, using deep learning approaches to extract possible relationships. We use the set of semantic triples generated through our system to assert in a cybersecurity knowledge graph. Security Analysts can retrieve this data from the knowledge graph, and use this information to form a decision about a cyber-attack.en_US
dc.description.urihttps://dl.acm.org/doi/10.1145/3341161.3343519en_US
dc.format.extent8 pagesen_US
dc.genrejournal articles preprintsen_US
dc.identifierdoi:10.13016/m2h1ov-6xex
dc.identifier.citationAditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, and Richard Zak. 2019. RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM ’19). Association for Computing Machinery, New York, NY, USA, 879–886. DOI:https://doi.org/10.1145/3341161.3343519en_US
dc.identifier.urihttp://hdl.handle.net/11603/14049
dc.identifier.urihttps://doi.org/10.1145/3341161.3343519
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2019 Association for Computing Machinery.
dc.subjectcybersecurityen_US
dc.subjectdeep learningen_US
dc.subjectknowledge graphsen_US
dc.subjectUMBC Ebiquity Research Group
dc.titleRelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvementen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1905.02497.pdf
Size:
743.7 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: