Extracting cybersecurity related linked data from text

dc.contributor.authorJoshi, Arnav
dc.contributor.authorLal, Ravendar
dc.contributor.authorFinin, Tim
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-11-02T15:51:00Z
dc.date.available2018-11-02T15:51:00Z
dc.date.issued2013-09-16
dc.descriptionProceedings of the 7th IEEE International Conference on Semantic Computingen
dc.description.abstractThe Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, news reports, cybersecurity blogs and Internet chat rooms. It can be useful to cybersecurity systems if there is a way to recognize and extract relevant information and represent it as easily shared and integrated semantic data. We describe such an automatic framework that generates and publishes a RDF linked data representation of cybersecurity concepts and vulnerability descriptions extracted from the National Vulnerability Database and from text sources. A CRF-based system is used to identify cybersecurity-related entities, concepts and relations in text, which are then represented using custom ontologies for the cybersecurity domain and also mapped to objects in the DBpedia knowledge base. The resulting cybersecurity linked data collection can be used for many purposes, including automating early vulnerability identification, mitigation and prevention efforts.en
dc.description.sponsorshipThis research was supported by grants from AFOSR (FA9550-08-1–0265) and NSF (IIS-1250627).
dc.description.urihttps://ieeexplore.ieee.org/document/6693525en
dc.format.extent8 pagesen
dc.genreconference papers and proceedings pre-printen
dc.identifierdoi:10.13016/M2FJ29H3V
dc.identifier.citationArnav Joshi, Ravendar Lal, Tim Finin, and Anupam Joshi, Extracting cybersecurity related linked data from text, 2013 IEEE Seventh International Conference on Semantic Computing , 2013, DOI: 10.1109/ICSC.2013.50en
dc.identifier.uri10.1109/ICSC.2013.50
dc.identifier.urihttp://hdl.handle.net/11603/11847
dc.language.isoenen
dc.publisherIEEE Computer Society Pressen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2013 IEEE
dc.subjectcybersecurityen
dc.subjectlinked dataen
dc.subjectinformation extractionen
dc.subjectontologyen
dc.subjectComputer crimeen
dc.subjectdata miningen
dc.subjectCRF-based systemen
dc.subjectNational Vulnerability Databaseen
dc.subjectRDF linked data representationen
dc.subjectUMBC Ebiquity Research Groupen
dc.subjectsecurity of dataen
dc.titleExtracting cybersecurity related linked data from texten
dc.typeTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
682.pdf
Size:
296.53 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: