TY - GEN
T1 - Towards a relation extraction framework for cyber-security concepts
AU - Jones, Corinne L.
AU - Bridges, Robert A.
AU - Huffer, Kelly M.T.
AU - Goodall, John R.
N1 - Publisher Copyright:
© 2015 ACM.
PY - 2015/4/7
Y1 - 2015/4/7
N2 - In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.
AB - In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.
KW - Active learning
KW - Bootstrapping
KW - Cyber security
KW - Information extraction
KW - Natural language processing
KW - Relation extraction
UR - http://www.scopus.com/inward/record.url?scp=84958769503&partnerID=8YFLogxK
U2 - 10.1145/2746266.2746277
DO - 10.1145/2746266.2746277
M3 - Conference contribution
AN - SCOPUS:84958769503
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015
PB - Association for Computing Machinery
T2 - 10th Annual Cyber and Information Security Research Conference, CISRC 2015
Y2 - 6 April 2015 through 8 April 2015
ER -