A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity

dc.contributor.authorDasgupta, Soham
dc.contributor.authorPiplai, Aritran
dc.contributor.authorKotal, Anantaa
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2020-12-14T16:50:09Z
dc.date.available2020-12-14T16:50:09Z
dc.date.issued2020-12-10
dc.description4th International Workshop on Big Data Analytics for Cyber Intelligence and Defense, IEEE International Conference on Big Dataen_US
dc.description.abstractNamed Entity Recognition (NER) is important in the cybersecurity domain. It helps researchers extract cyber threat information from unstructured text sources. The extracted cyber entities or key expressions can be used to model a cyber-attack described in an open-source text. A large number of general-purpose NER algorithms have been published that work well in text analysis. These algorithms do not perform well when applied to the cybersecurity domain. In the field of cybersecurity, the open-source text available varies greatly in complexity and underlying structure of the sentences. General-purpose NER algorithms can misrepresent domain-specific words, such as “malicious” and “javascript”. In this paper, we compare the recent deep learning-based NER algorithms on a cybersecurity dataset. We created a cybersecurity dataset collected from various sources, including “Microsoft Security Bulletin” and “Adobe Security Updates”. Some of these approaches proposed in the literature were not used for cybersecurity. Others are innovations proposed by us. This comparative study helps us identify the NER algorithms that are robust and can work well in sentences taken from a large number of cybersecurity sources. We tabulate their performance on the test set and identify the best NER algorithm for a cybersecurity corpus. We also discuss the different embedding strategies that aid in the process of NER for the chosen deep learning algorithms.en_US
dc.description.sponsorshipThis work supported in part by an award from DoD to Joshien_US
dc.description.urihttps://ieeexplore.ieee.org/document/9378482en_US
dc.format.extent9 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/m2wds7-b7n8
dc.identifier.citationS. Dasgupta, A. Piplai, A. Kotal and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity," 2020 IEEE International Conference on Big Data (Big Data), 2020, pp. 2596-2604, doi: 10.1109/BigData50022.2020.9378482.en_US
dc.identifier.urihttp://hdl.handle.net/11603/20255
dc.identifier.urihttps://doi.org/10.1109/BigData50022.2020.9378482
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2020 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectUMBC Ebiquity Research Group
dc.titleA Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurityen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1058.pdf
Size:
1.02 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: