Extracting Information about Security Vulnerabilities from Web Text
dc.contributor.author | Mulwad, Varish | |
dc.contributor.author | Li, Wenjia | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.contributor.author | Viswanathan, Krishnamurthy | |
dc.date.accessioned | 2018-11-14T17:33:44Z | |
dc.date.available | 2018-11-14T17:33:44Z | |
dc.date.issued | 2011-08-22 | |
dc.description | Proceedings of the Web Intelligence for Information Security Workshop | en_US |
dc.description.abstract | The Web is an important source of information about computer security threats, vulnerabilities and cyber-attacks. We present initial work on developing a framework to detect and extract information about vulnerabilities and attacks from Web text. Our prototype system uses Wikitology, a general purpose knowledge base derived from Wikipedia, to extract concepts that describe specific vulnerabilities and attacks, map them to related concepts from DBpedia and generate machine understandable assertions. Such a framework will be useful in adding structure to already existing vulnerability descriptions as well as detecting new ones. We evaluate our approach against vulnerability descriptions from the National Vulnerability Database. Our results suggest that it can be useful in monitoring streams of text from social media or chat rooms to identify potential new attacks and vulnerabilities or to collect data on the spread and volume of existing ones. | en_US |
dc.description.sponsorship | This work was partially supported by an grant from the Air Force Office of Scientific Research (MURI FA9550-08- 1-0265) and a gift from Northrop Grumman Corporation. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/6040854 | en_US |
dc.format.extent | 4 pages | en_US |
dc.genre | conference papers and proceedings preprints | en_US |
dc.identifier | doi:10.13016/M2CV4BW2Z | |
dc.identifier.citation | Varish Mulwad, Wenjia Li, Anupam Joshi, Tim Finin, and Krishnamurthy Viswanathan, Extracting Information about Security Vulnerabilities from Web Text, Proceedings of the Web Intelligence for Information Security Workshop, 2011, DOI: 10.1109/WI-IAT.2011.26 | en_US |
dc.identifier.uri | 10.1109/WI-IAT.2011.26 | |
dc.identifier.uri | http://hdl.handle.net/11603/11978 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2011 IEEE | |
dc.subject | security | en_US |
dc.subject | vulnerability | en_US |
dc.subject | information extraction | en_US |
dc.subject | entity linking | en_US |
dc.subject | Computer security | en_US |
dc.subject | Electronic publishing | en_US |
dc.subject | Data mining | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | Extracting Information about Security Vulnerabilities from Web Text | en_US |
dc.type | Text | en_US |