Automated Emerging Cyber Threat Identification and Profiting based on Natural Language Processing

  • Unique Paper ID: 175263
  • Volume: 11
  • Issue: 11
  • PageNo: 2597-2601
  • Abstract:
  • The duration of time window between the disclosures of new recent scenarios The Log4j vulnerability was identified in more, host to deployed threat in the target system. Within hours after the exploit was released attacker started scanning the network looking for vulnerability host to deploy threads like ransom ware crypto currency miners etc on the systems. When attacker started scanning the internet looking for vulnerable cyber vulnerability used by the cyber criminals, has been getting very smaller overtime. It becomes imperative for the cyber security defence strategy to detect threats and their capabilities as early as possible to minimize success of prevention action all though crucial discovering new threats is a challenging activity for security analysis due to the immense volume of data and information sources to analyse for signs that a threat is emerging. The framework comprises three main parts identification of cyber threats, profile in the identified threat and alarm generation based on threats risk. Represent a framework for automatic identification and profiling of emerging threads using social media messages as a source of events and MITRE attack as a source of knowledge for thread classification. The main contribution of our work is the approach to classifying and identifying threats in terms of their intentions and providing additional context on the threat for mitigation.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 11
  • PageNo: 2597-2601

Automated Emerging Cyber Threat Identification and Profiting based on Natural Language Processing

Related Articles