2022
DOI: 10.1155/2022/7729456
|View full text |Cite
|
Sign up to set email alerts
|

A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things

Abstract: The combination of 5G technology and the industrial Internet of things (IIoT) makes it possible to realize the interconnection of all things. Still, it also increases the risk of attacks such as large-scale DDoS attacks and IP spoofing attacks. Threat intelligence is a collection of information causing potential and nonpotential harm to the industrial Internet. Extracting network security entities and their relationships from threat intelligence text and constructing structured threat intelligence information … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In threatening behavior analysis, TTPDrill [25] utilized Natural Language Processing techniques and Information Retrieval methods to extract threat actions from unstructured CTI text. Yan et al [26]. used BERT-BiGRU to classify attack behaviors and attack strategies described in threat intelligence, thereby calculating the possibility of attacks and the degree of harm of attacks, especially for unstructured threat intelligence analysis of IIoT (Industrial Internet of Things).…”
Section: Related Workmentioning
confidence: 99%
“…In threatening behavior analysis, TTPDrill [25] utilized Natural Language Processing techniques and Information Retrieval methods to extract threat actions from unstructured CTI text. Yan et al [26]. used BERT-BiGRU to classify attack behaviors and attack strategies described in threat intelligence, thereby calculating the possibility of attacks and the degree of harm of attacks, especially for unstructured threat intelligence analysis of IIoT (Industrial Internet of Things).…”
Section: Related Workmentioning
confidence: 99%
“…Luo et al [27] proposed EDL-WADS, a deep learning-based network attack detection system that used all three models of CNN, MRN, and LSTM for network attack detection. Yan et al [28] used two techniques of feature weighting and BERT-BiGRU and proposed a method to analyze IIoT threat intelligence, which could realize automatic identification of attack behavior and attack strategies. Wang et al [29] improved the PCNN-ATT model and proposed a DRL-ETPCNN-ATT-based method for remote supervised relation extraction, which could extract threat intelligence from unstructured text.…”
Section: Threat Information Extractionmentioning
confidence: 99%
“…Terefore, industrial control protocols have become a common target for attackers to carry out network attacks. Conversely, industrial control protocols have also become the focus of defense against these attacks [4][5][6]. However, because of commercial and security factors, most industrial control protocol specifcations are not open to the public [7,8].…”
Section: Introductionmentioning
confidence: 99%