Extracting cybersecurity related linked data from text
dc.contributor.author | Joshi, Arnav | |
dc.contributor.author | Lal, Ravendar | |
dc.contributor.author | Finin, Tim | |
dc.contributor.author | Joshi, Anupam | |
dc.date.accessioned | 2018-11-02T15:51:00Z | |
dc.date.available | 2018-11-02T15:51:00Z | |
dc.date.issued | 2013-09-16 | |
dc.description | Proceedings of the 7th IEEE International Conference on Semantic Computing | en_US |
dc.description.abstract | The Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, news reports, cybersecurity blogs and Internet chat rooms. It can be useful to cybersecurity systems if there is a way to recognize and extract relevant information and represent it as easily shared and integrated semantic data. We describe such an automatic framework that generates and publishes a RDF linked data representation of cybersecurity concepts and vulnerability descriptions extracted from the National Vulnerability Database and from text sources. A CRF-based system is used to identify cybersecurity-related entities, concepts and relations in text, which are then represented using custom ontologies for the cybersecurity domain and also mapped to objects in the DBpedia knowledge base. The resulting cybersecurity linked data collection can be used for many purposes, including automating early vulnerability identification, mitigation and prevention efforts. | en_US |
dc.description.sponsorship | This research was supported by grants from AFOSR (FA9550-08-1–0265) and NSF (IIS-1250627). | |
dc.description.uri | https://ieeexplore.ieee.org/document/6693525 | en_US |
dc.format.extent | 8 pages | en_US |
dc.genre | conference papers and proceedings pre-print | en_US |
dc.identifier | doi:10.13016/M2FJ29H3V | |
dc.identifier.citation | Arnav Joshi, Ravendar Lal, Tim Finin, and Anupam Joshi, Extracting cybersecurity related linked data from text, 2013 IEEE Seventh International Conference on Semantic Computing , 2013, DOI: 10.1109/ICSC.2013.50 | en_US |
dc.identifier.uri | 10.1109/ICSC.2013.50 | |
dc.identifier.uri | http://hdl.handle.net/11603/11847 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE Computer Society Press | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2013 IEEE | |
dc.subject | cybersecurity | en_US |
dc.subject | linked data | en_US |
dc.subject | information extraction | en_US |
dc.subject | ontology | en_US |
dc.subject | Computer crime | en_US |
dc.subject | data mining | en_US |
dc.subject | CRF-based system | en_US |
dc.subject | National Vulnerability Database | en_US |
dc.subject | RDF linked data representation | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.subject | security of data | en_US |
dc.title | Extracting cybersecurity related linked data from text | en_US |
dc.type | Text | en_US |