2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) 2018
DOI: 10.1109/cic.2018.00040
|View full text |Cite
|
Sign up to set email alerts
|

Automated Threat Report Classification over Multi-Source Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…The statistics of reports used by previous documentlevel TTP mining methods (Ayoade et al 2018;Legoy (1) Li et al 2019) and our annotated dataset are shown in Table 3.…”
Section: Data Sourcementioning
confidence: 99%
See 1 more Smart Citation
“…The statistics of reports used by previous documentlevel TTP mining methods (Ayoade et al 2018;Legoy (1) Li et al 2019) and our annotated dataset are shown in Table 3.…”
Section: Data Sourcementioning
confidence: 99%
“…Several existing TTP classification methods (Ayoade et al 2018;Legoy 2019;Li et al 2019;Niakanlahiji et al 2018) are at the document level, which may cause lowaccuracy problems since the articles may consist of different kinds of TTPs. These methods also have limitations that can only provide static names with a confidence coefficient without providing more details, such as related TTP elements, which are also significant to cyber defenders.…”
Section: Introductionmentioning
confidence: 99%
“…In Wang et al [22], a method was proposed, which utilized TF-IDF scores of article contexts, combined with chi-square statistics, as the feature, and trained the SVM model as the classifier. An automated threat report classification method over company OSTIPs was discussed by Ayoade et al [23], and the method also utilized the TF-IDF scores as the classification feature. However, the bias-corrected classifier they trained can promote its accuracy and adaptive ability on article classification.…”
Section: Related Workmentioning
confidence: 99%
“…Dependency parsers mainly utilized NER techniques and machine learning methods. Mavroeidis et al [27] and Ayoade et al [23] proposed different CTI information extraction by building cybersecurity threat intelligence ontology. Iqbal and Anwar [28] demonstrated a combined ontological model of CKC [29] and POP [30] which can help extract CTI information from APT event-related articles.…”
Section: Related Workmentioning
confidence: 99%
“…Zhu et al [17] proposed an approach to bridge measurement data with manual analysis and train a multiclass classifier to extract IOCs and further categorize them into different stages. Ayoade et al [18] have leveraged natural language processing techniques to extract attacker's actions from threat report documents generated by different organizations and then automatically classify them into standardized tactics and techniques.…”
Section: Related Workmentioning
confidence: 99%