2020
DOI: 10.2197/ipsjjip.28.1025
|View full text |Cite
|
Sign up to set email alerts
|

Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
0
0
Order By: Relevance
“…Also, none of this research captures detailed attack patterns in a standardized format nor utilizes CTI reports for analysis. In [41], Thein et al propose a neural network approach for classifying sentences of a document into five phases of the cyber kill chain, which are broad categories for all the phases of a cyberattack. Similarly, [14] combines dependency parser and heuristics to extract threat actions from a document and map them to kill chain phases.…”
Section: Related Workmentioning
confidence: 99%
“…Also, none of this research captures detailed attack patterns in a standardized format nor utilizes CTI reports for analysis. In [41], Thein et al propose a neural network approach for classifying sentences of a document into five phases of the cyber kill chain, which are broad categories for all the phases of a cyberattack. Similarly, [14] combines dependency parser and heuristics to extract threat actions from a document and map them to kill chain phases.…”
Section: Related Workmentioning
confidence: 99%