Towards a relation extraction framework for cyber-security concepts

Corinne L. Jones, Robert A. Bridges, Kelly M.T. Huffer, John R. Goodall

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

64 Scopus citations

Abstract

In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

Original languageEnglish
Title of host publicationProceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450333450
DOIs
StatePublished - Apr 7 2015
Event10th Annual Cyber and Information Security Research Conference, CISRC 2015 - Oak Ridge, United States
Duration: Apr 6 2015Apr 8 2015

Publication series

NameACM International Conference Proceeding Series
Volume06-08-April-2015

Conference

Conference10th Annual Cyber and Information Security Research Conference, CISRC 2015
Country/TerritoryUnited States
CityOak Ridge
Period04/6/1504/8/15

Keywords

  • Active learning
  • Bootstrapping
  • Cyber security
  • Information extraction
  • Natural language processing
  • Relation extraction

Fingerprint

Dive into the research topics of 'Towards a relation extraction framework for cyber-security concepts'. Together they form a unique fingerprint.

Cite this