Journal on Communications ›› 2020, Vol. 41 ›› Issue (10): 80-91.doi: 10.11959/j.issn.1000-436x.2020174
• Papers • Previous Articles Next Articles
Tao LI,Yuanbo GUO,Ankang JU
Revised:
2020-07-23
Online:
2020-10-25
Published:
2020-11-05
Supported by:
CLC Number:
Tao LI,Yuanbo GUO,Ankang JU. Knowledge triple extraction in cybersecurity with adversarial active learning[J]. Journal on Communications, 2020, 41(10): 80-91.
"
模型 | 抽取结果 |
示例1 | Since the revelation of an[Adobe Flash Player]e1,hasVulnerabilityzero day exploit exposed as part of the leaked Hacking Team arsenal in 2015 designated[CVE-2015-5119]e2,hasVulnerability. |
Att-PCNN_BiLSTM | Since the revelation of an[Adobe Flash Player]e1 useszero day exploit exposed as part of the leaked Hacking Team arsenal in 2015 designated[CVE-2015-5119]e2 uses. |
BiLSTM-CRF-Multi_head | Since the revelation of an[Adobe Flash Player]e1 hasVulnerabilityzero day exploit exposed as part of the leaked Hacking Team arsenal in 2015 designated[CVE-2015-5119]e2 hasVulnerability. |
Dynamic-att-BiLSTM-LSTM | Since the revelation of an[Adobe Flash Player]e1 hasVulnerabilityzero day exploit exposed as part of the leaked Hacking Team arsenal in 2015 designated[CVE-2015-5119]e2 hasVulnerability. |
示例2 | Apt 28]e1,Mwhich we suspect is sponsored by[Russian]e2,comes-fromgovernment,uses[spear phishing emails]e2,usesto target its victims by specific topics. |
Att-PCNN_BiLSTM | Apt 28]e1,comes-fromwhich we suspect is sponsored by[Russian]e2,comes-fromgovernment,uses[spear phishing emails]to target its victims by specific topics. |
BiLSTM-CRF-Multi_head | Apt 28]e1,comes-fromwhich we suspect is sponsored by[Russian]e2,comes-fromgovernment,uses[spear phishing]emails to target its victims by specific topics. |
Dynamic-att-BiLSTM-LSTM | Apt 28]e1,Mwhich we suspect is sponsored by[Russian]e2,comes-fromgovernment,uses[spear phishing emails]e2,usesto target its victims by specific topics. |
示例3 | One identified malware sample ([75193fc10145931ec0788d7c88fc8832]e1,indicates,compiled in March 2014) uses a password-protected[.7z]e1,located-atto deliver the[Etumbot installer]e2,M,which is most likely contained within[spear phishing email]e2,located-at. |
Att-PCNN_BiLSTM | One identified malware sample ([75193fc10145931ec0788d7c88fc8832]e1,indicates,compiled in March 2014) uses a password-protected[.7z]to deliver the[Etumbot installer]e2,indicates,which is most likely contained within[spear phishing email]. |
BiLSTM-CRF-Multi_head | One identified malware sample ([75193fc10145931ec0788d7c88fc8832]e1,indicates,compiled in March 2014) uses a password-protected[.7z]to deliver the[Etumbot installer]e2,indicates,which is most likely contained within[spear phishing]email. |
Dynamic-att-BiLSTM-LSTM | One identified malware sample ([75193fc10145931ec0788d7c88fc8832]e1,indicates,compiled in March 2014) uses a password-protected[.7z]to deliver the[Etumbot installer]e2,M,which is most likely contained within[spear phishing email]e2,located-at. |
[1] | JOSHI A , LAL R , FININ T ,et al. Extracting cybersecurity related linked data from text[C]// 2013 IEEE Seventh International Conference on Semantic Computing. Piscataway:IEEE Press, 2013: 252-259. |
[2] | 鄂海红, 张文静, 肖思琪 ,等. 深度学习实体关系抽取研究综述[J]. 软件学报, 2019,30(6): 1793-1818. |
E H H , ZHANG W J , XIAO S Q ,et al. Survey of entity relationship extraction based on deep learning[J]. Journal of Software, 2019,30(6): 1793-1818. | |
[3] | PHANDI P , SILVA A , LU W . Semeval-2018 task 8:semantic extraction from cybersecurity reports using natural language processing (SecureNLP)[C]// Proceedings of the 12th International Workshop on Semantic Evaluation.[S.n.:s.l]. 2018: 697-706. |
[4] | SIMRAN K , SRIRAM R , VINAYAKUMAR R ,et al. Deep learning approach for intelligent named entity recognition of cyber security[J]. arXiv Preprint,arXiv:2004.00502, 2020 |
[5] | PINGLE A , PIPLAI A , MITTAL S ,et al. RelExt:relation extraction using deep learning approaches for cybersecurity knowledge graph improvement[C]// Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Piscataway:IEEE Press, 2019: 879-886. |
[6] | HUANG W , CHENG X , WANG T ,et al. BERT-based multi-head selection for joint entity-relation extraction[C]// CCF International Conference on Natural Language Processing and Chinese Computing. Berlin:Springer, 2019: 713-723. |
[7] | 曹明宇, 杨志豪, 罗凌 ,等. 基于神经网络的药物实体与关系联合抽取[J]. 计算机研究与发展, 2019,56(7): 1432-1440. |
CAO M Y , YANG Z H , LUO L ,et al. Joint drug entities and relations extraction based on neural networks[J]. Journal of Computer Research and Development, 2019,56(7): 1432-1440. | |
[8] | ZHENG S , WANG F , BAO H ,et al. Joint extraction of entities and relations based on a novel tagging scheme[C]// Proceedings of the 55th Association for Computational Linguistics.[S.n.:s.l]. 2017: 1227-1236. |
[9] | LIAO X . Towards automatically evaluating security risks and providing cyber intelligence[D]. Atlanta:Georgia Institute of Technology, 2017. |
[10] | PANWAR A . Toward automatic generation and analysis of indicators of compromise (IoCS) using convolutional neural network[D]. Arizona:Arizona State University, 2017. |
[11] | GASMI H , LAVAL J , BOURAS A . Information extraction of cybersecurity concepts:an LSTM approach[J]. Applied Science, 2019,9(19): 1-15. |
[12] | CHAMBERS N , FRY B , MCMASTERS J . Detecting denial-of-service attacks from social media text:applying nlp to computer security[C]// Proceedings of the North American Chapter of the Association for Computational Linguistics.[S.n.:s.l]. 2018: 1626-1635. |
[13] | ZHOU S , LONG Z , TAN L ,et al. Automatic identification of indicators of compromise using neural-based sequence labelling[J]. arXiv Preprint,arXiv:1810.10156, 2018 |
[14] | LONG Z , TAN L , ZHOU S ,et al. Collecting indicators of compromise from unstructured text of cybersecurity articles using neural-based sequence labelling[C]// 2019 International Joint Conference on Neural Networks (IJCNN). Piscataway:IEEE Press, 2019: 1-8. |
[15] | 秦娅, 申国伟, 赵文波 ,等. 基于深度神经网络的网络安全实体识别方法[J]. 南京大学学报(自然科学), 2019,55(1): 29-40. |
QIN Y , SHEN G W , ZHAO W B ,et al. Research on the method of network security entity recognition based on deep neural network[J]. Journal of Nanjing University(Natural Science), 2019,55(1): 29-40. | |
[16] | 张若彬, 刘嘉勇, 何祥 . 基于BLSTM-CRF模型的安全漏洞领域命名实体识别[J]. 四川大学学报(自然科学版), 2019,56(3): 469-475. |
ZHANG R B , LIU J Y , HE X . Named entity recognition for vulnerabilities based on BLSTM-CRF model[J]. Journal of Sichuan University(Natural Science Edition), 2019,56(3): 469-475. | |
[17] | ZHU J J , BENTO J . Generative adversarial active learning[J]. arXiv Preprint,arXiv:1702.07956v5, 2017 |
[18] | CULOTTA A , MCCALLUM A . Reducing labeling effort for structured prediction tasks[C]// International Conference on Artificial Intelligence. Piscataway:IEEE Press, 2005: 746-751. |
[19] | HOULSBY N , HUSZAR F , GHAHRAMANI Z ,et al. Bayesian active learning for classification and preference learning[J]. arXiv Preprint,arXiv:1112.5745, 2011 |
[20] | GAL Y , GHAHRAMANI Z . Dropout as a Bayesian approximation:representing model uncertainty in deep learning[C]// International Conference on Machine Learning. Piscataway:IEEE Press, 2016: 1050-1059. |
[21] | SENER O , SAVARESE S . Active Learning for convolutional neural networks:a core-set approach[J]. arXiv Preprint,arXiv:1708.00489, 2017 |
[22] | KUO W , HANE C , YUH E L ,et al. Cost-sensitive active learning for intracranial hemorrhage detection[C]// Medical Image Computing and Computer Assisted Intervention. Piscataway:IEEE Press, 2018: 715-723. |
[23] | SHEN Y , YUN H , LIPTON Z C ,et al. Deep active learning for named entity recognition[C]// International Conference on Learning Representations. Piscataway:IEEE Press, 2018: 1-15. |
[24] | CHIU J P C , NICHOLS E . Named entity recognition with bidirectional LSTM-CNNs[J]. Transactions of the Association for Computational Linguistics, 2016,4: 357-370. |
[25] | CAO P , CHEN Y , LIU K ,et al. Adversarial transfer learning for chinese named entity recognition with self-attention mechanism[C]// The 2018 Conference on Empirical Methods in Natural Language Processing. Piscataway:IEEE Press, 2018: 182-192. |
[26] | 程梦, 洪宇, 唐建 ,等. 面向属性抽取的门控动态注意力机制[J]. 模式识别与人工智能, 2019,32(2): 184-192. |
CHENG M , HONG Y , TANG J ,et al. Gated dynamic attention mechanism towards aspect extraction[J]. Pattern Recognition and Artificial Intelligence, 2019,32(2): 184-192. | |
[27] | TIELEMAN T , HINTON G.Lecture 6 . 5-rmsprop,coursera:neural networks for machine learning[R]. University of Toronto,Technical Report, 2012. |
[28] | 张晓斌, 陈福才, 黄瑞阳 . 基于 CNN 和双向 LSTM 融合的实体关系抽取[J]. 网络与信息安全学报, 2018,4(9): 44-51. |
ZHANG X B , CHEN F C , HUANG R Y . Relation extraction based on CNN and BiLSTM[J]. Chinese Journal of Network and Information Security, 2018,4(9): 44-51. | |
[29] | XU Y , MOU L , LI G ,et al. Classifying Relations via long short term memory networks along shortest dependency paths[C]// The 2015 Conference on Empirical Methods in Natural Language Processing. Piscataway:IEEE Press, 2015: 1785-1794. |
[30] | MIWA M , BANSAL M . End-to-end relation extraction using LSTMs on sequences and tree structures[C]// The 54th Annual Meeting of the Association for Computational Linguistics. Piscataway:IEEE Press, 2016: 1105-1116. |
[31] | BEKOULIS G , DELEU J , DEMEESTER T ,et al. Joint entity recognition and relation extraction as a multi-head selection problem[J]. arXiv Preprint,arXiv:1804.07847, 2018 |
[1] | Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN. Membership inference attack and defense method in federated learning based on GAN [J]. Journal on Communications, 2023, 44(5): 193-205. |
[2] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[3] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU. Adversarial training driven malicious code detection enhancement method [J]. Journal on Communications, 2022, 43(9): 169-180. |
[6] | Yanwen WANG, Weimin LEI, Wei ZHANG, Huan MENG, Xinyi CHEN, Wenhui YE, Qingyang JING. Survey on video image reconstruction method based on generative model [J]. Journal on Communications, 2022, 43(9): 194-208. |
[7] | Xueyuan DUAN, Yu FU, Kun WANG. Multi-dimensional time series anomaly detection method based on VAE-WGAN [J]. Journal on Communications, 2022, 43(3): 1-13. |
[8] | Xiayu XIANG, Jiahui WANG, Zirui WANG, Shaoming DUAN, Hezhong PAN, Rongfei ZHUANG, Peiyi HAN, Chuanyi LIU. Generate medical synthetic data based on generative adversarial network [J]. Journal on Communications, 2022, 43(3): 211-224. |
[9] | Yanhui LU, Han LIU, Hang LI, Guangxu ZHU. Time series generation model based on multi-discriminator generative adversarial network [J]. Journal on Communications, 2022, 43(10): 167-176. |
[10] | Wei LIU, Cheng CHEN, Rui JIANG, Tao LU. Four-path unsupervised learning-based image defogging network [J]. Journal on Communications, 2022, 43(10): 210-222. |
[11] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[12] | Hongyan WANG, Xiao YANG, Yanchao JIANG, Zumin WANG. Image denoising algorithm based on multi-channel GAN [J]. Journal on Communications, 2021, 42(3): 229-237. |
[13] | Zunwen HE, Shuai HOU, Wancheng ZHANG, Yan ZHANG. Multi-feature fusion classification method for communication specific emitter identification [J]. Journal on Communications, 2021, 42(2): 103-112. |
[14] | Wufei WU,Renfa LI,Gang ZENG,Yong XIE,Guoqi XIE. Survey of the intelligent and connected vehicle cybersecurity [J]. Journal on Communications, 2020, 41(6): 161-174. |
[15] | Linhui LI,Bin ZHOU,Jing LIAN,Yafu ZHOU. Research on pedestrian trajectory prediction method based on social attention mechanism [J]. Journal on Communications, 2020, 41(6): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|