Javascript must be enabled to continue!
CTI View: APT Threat Intelligence Analysis System
View through CrossRef
With the development of advanced persistent threat (APT) and the increasingly severe situation of network security, the strategic defense idea with the concept of “active defense, traceability, and countermeasures” arises at the historic moment, thus cyberspace threat intelligence (CTI) has become increasingly valuable in enhancing the ability to resist cyber threats. Based on the actual demand of defending against the APT threat, we apply natural language processing to process the cyberspace threat intelligence (CTI) and design a new automation system CTI View, which is oriented to text extraction and analysis for the massive unstructured cyberspace threat intelligence (CTI) released by various security vendors. The main work of CTI View is as follows: (1) to deal with heterogeneous CTI, a text extraction framework for threat intelligence is designed based on automated test framework, text recognition technology, and text denoising technology. It effectively solves the problem of poor adaptability when crawlers are used to crawl heterogeneous CTI; (2) using regular expressions combined with blacklist and whitelist mechanism to extract the IOC and TTP information described in CTI effectively; (3) according to the actual requirements, a model based on bidirectional encoder representations from transformers (BERT) is designed to complete the entity extraction algorithm for heterogeneous threat intelligence. In this paper, the GRU layer is added to the existing BERT-BiLSTM-CRF model, and we evaluate the proposed model on the marked dataset and get better performance than the current mainstream entity extraction mode.
Title: CTI View: APT Threat Intelligence Analysis System
Description:
With the development of advanced persistent threat (APT) and the increasingly severe situation of network security, the strategic defense idea with the concept of “active defense, traceability, and countermeasures” arises at the historic moment, thus cyberspace threat intelligence (CTI) has become increasingly valuable in enhancing the ability to resist cyber threats.
Based on the actual demand of defending against the APT threat, we apply natural language processing to process the cyberspace threat intelligence (CTI) and design a new automation system CTI View, which is oriented to text extraction and analysis for the massive unstructured cyberspace threat intelligence (CTI) released by various security vendors.
The main work of CTI View is as follows: (1) to deal with heterogeneous CTI, a text extraction framework for threat intelligence is designed based on automated test framework, text recognition technology, and text denoising technology.
It effectively solves the problem of poor adaptability when crawlers are used to crawl heterogeneous CTI; (2) using regular expressions combined with blacklist and whitelist mechanism to extract the IOC and TTP information described in CTI effectively; (3) according to the actual requirements, a model based on bidirectional encoder representations from transformers (BERT) is designed to complete the entity extraction algorithm for heterogeneous threat intelligence.
In this paper, the GRU layer is added to the existing BERT-BiLSTM-CRF model, and we evaluate the proposed model on the marked dataset and get better performance than the current mainstream entity extraction mode.
Related Results
The anatomy investigation of cavotricuspid isthmus linear ablation navigated by CARTO
The anatomy investigation of cavotricuspid isthmus linear ablation navigated by CARTO
Objective
We sought to investigate the anatomy characteristics of cavotricuspid isthmus (CTI) and its influence on linear ablation navigated by CARTO in patients ...
CIÊNCIA PARA REDUÇÃO DAS DESIGUALDADES: RELATO DE EXPERIÊNCIA DA SEMANA NACIONAL DE CIÊNCIA E TECNOLOGIA DO DISTRITO CRIATIVO DO PELOURINHO
CIÊNCIA PARA REDUÇÃO DAS DESIGUALDADES: RELATO DE EXPERIÊNCIA DA SEMANA NACIONAL DE CIÊNCIA E TECNOLOGIA DO DISTRITO CRIATIVO DO PELOURINHO
O presente artigo intitulado Semana Nacional de Ciência, Tecnologia e Inovação do Distrito Criativo do Pelourinho (SNCT Pelô): Ciência para a Redução das Desigualdades é fruto de u...
AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES
AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES
The increasing negligence and complexity of online confrontations have made it abundantly clear that an organization must place a premium on real-time, ready-to-use, and expandable...
Managing Anti-Platelet Therapy in Thrombocytopaenic Patients with Haematological Malignancy: A Multinational Clinical Vignette-Based Experiment
Managing Anti-Platelet Therapy in Thrombocytopaenic Patients with Haematological Malignancy: A Multinational Clinical Vignette-Based Experiment
AbstractData on anti-platelet therapy (APT) for prevention of atherothrombotic events in thrombocytopaenic cancer patients is lacking. We aimed to identify patient and physician ch...
The Role of Cyber Threat Intelligence in Protecting National Infrastructure.
The Role of Cyber Threat Intelligence in Protecting National Infrastructure.
Cyber threats pose a significant risk to national infrastructure, with critical sectors such as energy, transportation, healthcare, and finance increasingly targeted by sophisticat...
The role evolution of textile industry in China’s economy during 2002–2020:
an input-output analysis
The role evolution of textile industry in China’s economy during 2002–2020:
an input-output analysis
This paper uses the input-output (I-O) model to evaluate industry linkages and industry spread of China’s textile industry
(CTI) to investigate the role evolution of CTI in China’s...
Correlative investigations by
HAADF‐STEM
and Atom Probe Tomography
Correlative investigations by
HAADF‐STEM
and Atom Probe Tomography
The ultimate capabilities achieved by electron microscopies and their associated techniques inevitably raise the following question: is there room for conceiving new ways of invest...
Cyber Threat Intelligence and Analysis
Cyber Threat Intelligence and Analysis
Cyber Threat Intelligence and Analysis offers a comprehensive exploration of the methodologies, tools, and practices essential for understanding and mitigating cyber threats in the...

