TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang… - Cybersecurity, 2022 - Springer
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …

Explainable cyber threat behavior identification based on self-adversarial topic generation

W Ge, J Wang, T Lin, B Tang, X Li - Computers & Security, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) provides ample evidence and information regarding
the detection of cyber attack activities. Existing methods employ CTI reports to extract …

Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources

G Husari, E Al-Shaer, M Ahmed, B Chu… - Proceedings of the 33rd …, 2017 - dl.acm.org
With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes
essential to identify and respond to cyber attack in timely and cost-effective manner …

Automated cyber threat intelligence reports classification for early warning of cyber attacks in next generation SOC

W Yang, KY Lam - … Security: 21st International Conference, ICICS 2019 …, 2020 - Springer
Serving as a facility to collect and analyze security data, monitor anomaly activities, Security
Operation Center (SOC) provides defense measures to protect the enterprise and …

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

Y You, J Jiang, Z Jiang, P Yang, B Liu, H Feng, X Wang… - Cybersecurity, 2022 - Springer
Abstract TTPs (Tactics, Techniques, and Procedures), which represent an attacker's goals
and methods, are the long period and essential feature of the attacker. Defenders can use …

AITI: An automatic identification model of threat intelligence based on convolutional neural network

S Xun, X Li, Y Gao - Proceedings of the 2020 the 4th International …, 2020 - dl.acm.org
Cyberspace security issues are becoming more and more important, but traditional methods
cannot cope with changing cyber-attack methods, which often leads to severe network …

An approach on cyber threat intelligence using recurrent neural network

U Sakthivelu, CNS Vinoth Kumar - ICT Infrastructure and Computing …, 2022 - Springer
The term cyber threat intelligence refers to evidence-based knowledge that has been
collected, processed, and analyzed to understand about the threat existing or emerging …

An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix

S Zhang, P Chen, G Bai, S Wang… - Wireless …, 2022 - Wiley Online Library
With the occurrence of cyber security incidents, the value of threat intelligence is coming to
the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can …

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text

H Jo, Y Lee, S Shin - Computers & Security, 2022 - Elsevier
To counteract the rapidly evolving cyber threats, many research efforts have been made to
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …

A literature review on mining cyberthreat intelligence from unstructured texts

MR Rahman, R Mahdavi-Hezaveh… - … Conference on Data …, 2020 - ieeexplore.ieee.org
Cyberthreat defense mechanisms have become more proactive these days, and thus
leading to the increasing incorporation of cyberthreat intelligence (CTI). Cybersecurity …