Abstract
The advancement of hacking techniques has extended the sophistication of cyberattacks. Facing evolving cyberattacks, security officers need to acquire information about cyberattacks to gain visibility into the fast-evolving threat landscape. This research proposes a novel threat intelligence summarization system that extracts critical information and produces a summary report. This study combines BERT and BiLSTM and proposes a hybrid word embedding model to capture the critical information in the corpus. The evaluation results show that the proposed system could summarize reports effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Embroker Team. 2022 Must-Know Cyber Attack Statistics and Trends. https://www.embroker.com/blog/cyber-attack-statistics/. Accessed 4 July 2022
The Associated Press: The Latest: UN warns cybercrime on rise during pandemic. https://abcnews.go.com/Health/wireStory/latest-india-reports-largest-single-day-virus-spike-70826542. Accessed 5 July 2022
Microsoft: Cybersecurity threats to cost organizations in Asia Pacific US$1.75 trillion in economic losses (2018). https://news.microsoft.com/apac/2018/05/18/cybersecurity-threats-to-cost-organizations-in-asia-pacific-us1-75-trillion-in-economic-losses/. Accessed 20 June 2022
O'Driscoll, A.: 25+ cyber security vulnerability statistics and facts of 2022. https://www.comparitech.com/blog/information-security/cybersecurity-vulnerability-statistics/. Accessed 5 July 2022
Johnson, C., Badger, M., Waltermire, D., Snyder, J., Skorupka, C.: Guide to cyber threat information sharing. National Institute of Standards and Technology (2016)
Friedman, J., Bouchard, M.: Definitive Guide to Cyber Threat Intelligence. https://cryptome.org/2015/09/cti-guide.pdf. Accessed 11 Nov 2022
Brown, R., Lee, R.M.: SANS Cyber Threat Intelligence (CTI) Survey (2021). https://www.cybersixgill.com/wp-content/uploads/2021/02/SANS_CTI_Survey_2021_Sixgill.pdf
Saremi, A., Jula, P., ElMekkawy, T., Wang, G.G.: Appointment scheduling of outpatient surgical services in a multistage operating room department. Int. J. Prod. Econ. 141(2), 646–658 (2013)
Liao, X., Yuan, K., Wang, X., Li, Z., Xing, L., Beyah, R.: Acing the ioc game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755–766 (2016)
Kurogome, Y., et al.: EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 687–701 (2019)
Benjamin, V., Chen, H.: Developing understanding of hacker language through the use of lexical semantics. In: 2015 IEEE International Conference on Intelligence and Security Informatics (ISI) , pp. 79–84. IEEE (2015)
Deliu, I., Leichter, C., Franke, K.: Extracting cyber threat intelligence from hacker forums: support vector machines versus convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data) , pp. 3648–3656. IEEE (2017)
Chen, C.-M., Kan, J.-Y., Ou, Y.-H., Cai, Z.-X., Guan, A.: Threat Action Extraction using Information Retrieval, pp. 13–19 (2021)
kbandla: Aptnotes. https://github.com/aptnotes/data. Accessed 11 Nov 2020
Natural Language Toolkit. https://www.nltk.org/. Accessed 1 May 2020
Lin, C.-Y.: Rouge: A package for automatic evaluation of summaries. In: Text summarization branches out, pp. 74–81 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, CM., Wang, YX., Cai, Z.X., Lee, B., Lai, G.H. (2022). Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. In: Hsieh, SY., Hung, LJ., Klasing, R., Lee, CW., Peng, SL. (eds) New Trends in Computer Technologies and Applications. ICS 2022. Communications in Computer and Information Science, vol 1723. Springer, Singapore. https://doi.org/10.1007/978-981-19-9582-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-19-9582-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9581-1
Online ISBN: 978-981-19-9582-8
eBook Packages: Computer ScienceComputer Science (R0)