Extracting cybersecurity related linked data from text

dc.contributor.authorJoshi, Arnav
dc.contributor.authorLal, Ravendar
dc.contributor.authorFinin, Tim
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-11-02T15:51:00Z
dc.date.available2018-11-02T15:51:00Z
dc.date.issued2013-09-16
dc.descriptionProceedings of the 7th IEEE International Conference on Semantic Computingen_US
dc.description.abstractThe Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, news reports, cybersecurity blogs and Internet chat rooms. It can be useful to cybersecurity systems if there is a way to recognize and extract relevant information and represent it as easily shared and integrated semantic data. We describe such an automatic framework that generates and publishes a RDF linked data representation of cybersecurity concepts and vulnerability descriptions extracted from the National Vulnerability Database and from text sources. A CRF-based system is used to identify cybersecurity-related entities, concepts and relations in text, which are then represented using custom ontologies for the cybersecurity domain and also mapped to objects in the DBpedia knowledge base. The resulting cybersecurity linked data collection can be used for many purposes, including automating early vulnerability identification, mitigation and prevention efforts.en_US
dc.description.sponsorshipThis research was supported by grants from AFOSR (FA9550-08-1–0265) and NSF (IIS-1250627).
dc.description.urihttps://ieeexplore.ieee.org/document/6693525en_US
dc.format.extent8 pagesen_US
dc.genreconference papers and proceedings pre-printen_US
dc.identifierdoi:10.13016/M2FJ29H3V
dc.identifier.citationArnav Joshi, Ravendar Lal, Tim Finin, and Anupam Joshi, Extracting cybersecurity related linked data from text, 2013 IEEE Seventh International Conference on Semantic Computing , 2013, DOI: 10.1109/ICSC.2013.50en_US
dc.identifier.uri10.1109/ICSC.2013.50
dc.identifier.urihttp://hdl.handle.net/11603/11847
dc.language.isoen_USen_US
dc.publisherIEEE Computer Society Pressen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2013 IEEE
dc.subjectcybersecurityen_US
dc.subjectlinked dataen_US
dc.subjectinformation extractionen_US
dc.subjectontologyen_US
dc.subjectComputer crimeen_US
dc.subjectdata miningen_US
dc.subjectCRF-based systemen_US
dc.subjectNational Vulnerability Databaseen_US
dc.subjectRDF linked data representationen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.subjectsecurity of dataen_US
dc.titleExtracting cybersecurity related linked data from texten_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
682.pdf
Size:
296.53 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: