Deep Learning Approach for Intelligent Named Entity Recognition of Cyber
Security
- URL: http://arxiv.org/abs/2004.00502v1
- Date: Tue, 31 Mar 2020 00:36:19 GMT
- Title: Deep Learning Approach for Intelligent Named Entity Recognition of Cyber
Security
- Authors: Simran K, Sriram S, Vinayakumar R, Soman KP
- Abstract summary: Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data.
A Deep Learning (DL) based approach embedded with Conditional Random Fields (CRFs) is proposed in this paper.
The combination of Bidirectional Gated Recurrent Unit (Bi-GRU), Convolutional Neural Network (CNN), and CRF performed better compared to various other DL frameworks on a publicly available benchmark dataset.
- Score: 5.180648702293017
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In recent years, the amount of Cyber Security data generated in the form of
unstructured texts, for example, social media resources, blogs, articles, and
so on has exceptionally increased. Named Entity Recognition (NER) is an initial
step towards converting this unstructured data into structured data which can
be used by a lot of applications. The existing methods on NER for Cyber
Security data are based on rules and linguistic characteristics. A Deep
Learning (DL) based approach embedded with Conditional Random Fields (CRFs) is
proposed in this paper. Several DL architectures are evaluated to find the most
optimal architecture. The combination of Bidirectional Gated Recurrent Unit
(Bi-GRU), Convolutional Neural Network (CNN), and CRF performed better compared
to various other DL frameworks on a publicly available benchmark dataset. This
may be due to the reason that the bidirectional structures preserve the
features related to the future and previous words in a sequence.
Related papers
- CTINEXUS: Leveraging Optimized LLM In-Context Learning for Constructing Cybersecurity Knowledge Graphs Under Data Scarcity [49.657358248788945]
Textual descriptions in cyber threat intelligence (CTI) reports are rich sources of knowledge about cyber threats.
Current CTI extraction methods lack flexibility and generalizability, often resulting in inaccurate and incomplete knowledge extraction.
We propose CTINexus, a novel framework leveraging optimized in-context learning (ICL) of large language models.
arXiv Detail & Related papers (2024-10-28T14:18:32Z) - Sequential Binary Classification for Intrusion Detection in Software Defined Networks [0.0]
Intrusion Detection Systems (IDS) are a pivotal part of software-Defined Networks (SDN)
IDS datasets suffer from high class imbalance, which impacts the performance of standard Machine Learning (ML) models.
We propose Sequential Binary Classification (SBC) - an algorithm for multi-class classification to address this issue.
arXiv Detail & Related papers (2024-06-10T08:34:13Z) - Semantic Multi-Resolution Communications [31.285983939625098]
We propose a novel deep learning multi-resolution JSCC framework inspired by the concept of multi-task learning (MTL)
This framework excels at encoding data for different resolutions through hierarchical layers and effectively decodes it by leveraging both current and past layers of encoded data.
This framework holds great potential for semantic communication, where the objective extends beyond data reconstruction to preserving specific semantic attributes.
arXiv Detail & Related papers (2023-08-22T17:52:44Z) - Enhancing Few-shot NER with Prompt Ordering based Data Augmentation [59.69108119752584]
We propose a Prompt Ordering based Data Augmentation (PODA) method to improve the training of unified autoregressive generation frameworks.
Experimental results on three public NER datasets and further analyses demonstrate the effectiveness of our approach.
arXiv Detail & Related papers (2023-05-19T16:25:43Z) - Multi-features based Semantic Augmentation Networks for Named Entity
Recognition in Threat Intelligence [7.321994923276344]
We propose a semantic augmentation method which incorporates different linguistic features to enrich the representation of input tokens.
In particular, we encode and aggregate the constituent feature, morphological feature and part of speech feature for each input token to improve the robustness of the method.
We have conducted experiments on the cybersecurity datasets DNRTI and MalwareTextDB, and the results demonstrate the effectiveness of the proposed method.
arXiv Detail & Related papers (2022-07-01T06:55:12Z) - An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day
Attacks [4.607145155913717]
Intrusion detection system (IDS) is essential element of security monitoring in computer networks.
Main challenge of an IDS is facing new (i.e., zero-day) attacks and separating them from benign traffic and existing types of attacks.
In this paper, we propose a framework for deep learning-based IDSes addressing new attacks.
arXiv Detail & Related papers (2021-08-20T14:41:28Z) - Enhancing the Generalization for Intent Classification and Out-of-Domain
Detection in SLU [70.44344060176952]
Intent classification is a major task in spoken language understanding (SLU)
Recent works have shown that using extra data and labels can improve the OOD detection performance.
This paper proposes to train a model with only IND data while supporting both IND intent classification and OOD detection.
arXiv Detail & Related papers (2021-06-28T08:27:38Z) - Nested and Balanced Entity Recognition using Multi-Task Learning [0.0]
This paper introduces a partly-layered network architecture that deals with the complexity of overlapping and nested cases.
We train and evaluate this architecture to recognise two kinds of entities - Concepts (CR) and Named Entities (NER)
Our approach achieves state-of-the-art NER performances, while it outperforms previous CR approaches.
arXiv Detail & Related papers (2021-06-11T07:52:32Z) - Few-Shot Named Entity Recognition: A Comprehensive Study [92.40991050806544]
We investigate three schemes to improve the model generalization ability for few-shot settings.
We perform empirical comparisons on 10 public NER datasets with various proportions of labeled data.
We create new state-of-the-art results on both few-shot and training-free settings.
arXiv Detail & Related papers (2020-12-29T23:43:16Z) - Keyphrase Extraction with Dynamic Graph Convolutional Networks and
Diversified Inference [50.768682650658384]
Keyphrase extraction (KE) aims to summarize a set of phrases that accurately express a concept or a topic covered in a given document.
Recent Sequence-to-Sequence (Seq2Seq) based generative framework is widely used in KE task, and it has obtained competitive performance on various benchmarks.
In this paper, we propose to adopt the Dynamic Graph Convolutional Networks (DGCN) to solve the above two problems simultaneously.
arXiv Detail & Related papers (2020-10-24T08:11:23Z) - Improved Code Summarization via a Graph Neural Network [96.03715569092523]
In general, source code summarization techniques use the source code as input and outputs a natural language description.
We present an approach that uses a graph-based neural architecture that better matches the default structure of the AST to generate these summaries.
arXiv Detail & Related papers (2020-04-06T17:36:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.