A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network

نویسندگان

چکیده

Cyber threat intelligence (CTI) refers to essential knowledge used by organizations prevent or mitigate against cyber attacks. Vulnerability databases such as CVE and NVD are crucial intelligence, but also provide information leveraged in hundreds of security products worldwide. However, previous studies have shown that these vulnerability sometimes contain errors inconsistencies which be manually checked professionals. Such could threaten the integrity hamper attack mitigation efforts. Hence, assist community with more accurate time-saving validation data, we propose an automated classification system based on deep learning. Our proposed utilizes a self-attention neural network (SA-DNN) model text mining approach identify category from description contained within report. The performance SA-DNN-based is evaluated using 134,091 reports details website.The experiments performed demonstrates effectiveness our approach, shows SA-DNN outperforms SVM other learning methods i.e. CNN-LSTM graph convolutional networks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compressed Learning: A Deep Neural Network Approach

This work presents a novel deep learning approach to Compressed-Learning.  Jointly optimizing the sensing and inference operators. Outperforming state-of-the-art CL methods on MNIST and CIFAR10. Extendible to numerous CL applications. The research leading to these results has received funding from the European Research Council under European Union's Seventh Framework Program, ERC Grant agre...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Forward kinematic analysis of planar parallel robots using a neural network-based approach optimized by machine learning

The forward kinematic problem of parallel robots is always considered as a challenge in the field of parallel robots due to the obtained nonlinear system of equations. In this paper, the forward kinematic problem of planar parallel robots in their workspace is investigated using a neural network based approach. In order to increase the accuracy of this method, the workspace of the parallel robo...

متن کامل

Developing A Fault Diagnosis Approach Based On Artificial Neural Network And Self Organization Map For Occurred ADSL Faults

Telecommunication companies have received a great deal of research attention, which have many advantages such as low cost, higher qualification, simple installation and maintenance, and high reliability. However, the using of technical maintenance approaches in Telecommunication companies could improve system reliability and users' satisfaction from Asymmetric digital subscriber line (ADSL) ser...

متن کامل

Deep learning-based CAD systems for mammography: A review article

Breast cancer is one of the most common types of cancer in women. Screening mammography is a low‑dose X‑ray examination of breasts, which is conducted to detect breast cancer at early stages when the cancerous tumor is too small to be felt as a lump. Screening mammography is conducted for women with no symptoms of breast cancer, for early detection of cancer when the cancer is most treatable an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Network and Systems Management

سال: 2021

ISSN: ['1064-7570', '1573-7705']

DOI: https://doi.org/10.1007/s10922-021-09624-6