RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
dc.contributor.author | Pingle, Aditya | |
dc.contributor.author | Piplai, Aritran | |
dc.contributor.author | Mittal, Sudip | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Holt, James | |
dc.contributor.author | Zak, Richard | |
dc.date.accessioned | 2019-06-11T18:12:13Z | |
dc.date.available | 2019-06-11T18:12:13Z | |
dc.date.issued | 2019-05-16 | |
dc.description.abstract | Security Analysts that work in a `Security Operations Center' (SoC) play a major role in ensuring the security of the organization. The amount of background knowledge they have about the evolving and new attacks makes a significant difference in their ability to detect attacks. Open source threat intelligence sources, like text descriptions about cyber-attacks, can be stored in a structured fashion in a cybersecurity knowledge graph. A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried. A semantic triple contains two cybersecurity entities with a relationship between them. In this work, we propose a system to create semantic triples over cybersecurity text, using deep learning approaches to extract possible relationships. We use the set of semantic triples generated through our system to assert in a cybersecurity knowledge graph. Security Analysts can retrieve this data from the knowledge graph, and use this information to form a decision about a cyber-attack. | en_US |
dc.description.uri | https://dl.acm.org/doi/10.1145/3341161.3343519 | en_US |
dc.format.extent | 8 pages | en_US |
dc.genre | journal articles preprints | en_US |
dc.identifier | doi:10.13016/m2h1ov-6xex | |
dc.identifier.citation | Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, and Richard Zak. 2019. RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM ’19). Association for Computing Machinery, New York, NY, USA, 879–886. DOI:https://doi.org/10.1145/3341161.3343519 | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/14049 | |
dc.identifier.uri | https://doi.org/10.1145/3341161.3343519 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2019 Association for Computing Machinery. | |
dc.subject | cybersecurity | en_US |
dc.subject | deep learning | en_US |
dc.subject | knowledge graphs | en_US |
dc.subject | UMBC Ebiquity Research Group | |
dc.title | RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement | en_US |
dc.type | Text | en_US |