2022
DOI: 10.1016/j.cose.2022.102763
|View full text |Cite
|
Sign up to set email alerts
|

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(4 citation statements)
references
References 10 publications
0
2
0
2
Order By: Relevance
“…), personal or business blogs, file or code repositories, public logfiles. The challenging problem is that these sources are in natural language [74] and unstructured (one can imagine a mobile chat group), and require processing information to generate CTI that is concise, structured and better fit to an automated standard and later to be shared on a platform [79], [80], [81]. Another problem is correlation [82]: to build actionable CTI about a specific threat, one is likely to need to correlate multiple sources and at multiple events.…”
Section: ) Architectures and Trust Managementmentioning
confidence: 99%
“…), personal or business blogs, file or code repositories, public logfiles. The challenging problem is that these sources are in natural language [74] and unstructured (one can imagine a mobile chat group), and require processing information to generate CTI that is concise, structured and better fit to an automated standard and later to be shared on a platform [79], [80], [81]. Another problem is correlation [82]: to build actionable CTI about a specific threat, one is likely to need to correlate multiple sources and at multiple events.…”
Section: ) Architectures and Trust Managementmentioning
confidence: 99%
“…Esse conhecimento pode melhorar o tempo de resposta a um incidente de seguranc ¸a. Por outro lado, segundo [Jo et al 2022] os IoCs são apenas um dos tipos de dados CTI e não devem ser o único foco das estratégias de seguranc ¸a cibernética, já que as ameac ¸as estão em constante evoluc ¸ão e se tornando cada vez mais sofisticadas.…”
Section: Indicadores De Comprometimento (Iocs)unclassified
“…Durante essas fases, os agentes maliciosos podem deixar rastros associados a atividades específicas, como tentativas de acesso a URLs incomuns ou a manipulac ¸ão de listas de e-mails corporativos. Esses vestígios são conhecidos como Indicadores de Comprometimento (IoCs) [Jo et al 2022], funcionando como uma espécie de impressão digital que pode ser observada por especialistas em seguranc ¸a da informac ¸ão. Além disso, exemplos adicionais de IoCs compreendem enderec ¸os Internet Protocol (IP), nomes de domínio e hashes de arquivos.…”
Section: Introduc ¸ãOunclassified
“…Zhou et al [4] also proposed an extraction system for APT threat intelligence, but they could only extract related entities. Vulcan [5] extracted descriptive or static CTI data from unstructured text and determined their semantic relationships. However, their defnitions of entities and relationships in threat intelligence are not comprehensive.…”
Section: Introductionmentioning
confidence: 99%