Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{175263, author = {Koppadi Pavan Kumar and Sesha Giri Rao Thalluri}, title = {Automated Emerging Cyber Threat Identification and Profiting based on Natural Language Processing}, journal = {International Journal of Innovative Research in Technology}, year = {2025}, volume = {11}, number = {11}, pages = {2597-2601}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=175263}, abstract = {The duration of time window between the disclosures of new recent scenarios The Log4j vulnerability was identified in more, host to deployed threat in the target system. Within hours after the exploit was released attacker started scanning the network looking for vulnerability host to deploy threads like ransom ware crypto currency miners etc on the systems. When attacker started scanning the internet looking for vulnerable cyber vulnerability used by the cyber criminals, has been getting very smaller overtime. It becomes imperative for the cyber security defence strategy to detect threats and their capabilities as early as possible to minimize success of prevention action all though crucial discovering new threats is a challenging activity for security analysis due to the immense volume of data and information sources to analyse for signs that a threat is emerging. The framework comprises three main parts identification of cyber threats, profile in the identified threat and alarm generation based on threats risk. Represent a framework for automatic identification and profiling of emerging threads using social media messages as a source of events and MITRE attack as a source of knowledge for thread classification. The main contribution of our work is the approach to classifying and identifying threats in terms of their intentions and providing additional context on the threat for mitigation.}, keywords = {vulnerability, disclosures, intentions, comprises, exploit, Log4j, capabilities, prevention, ransom ware, immense, scanning, framework, defence, strategy, discovering.}, month = {April}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry