Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
41 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
41 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study (2208.12144v1)

Published 25 Aug 2022 in cs.CR, cs.CL, and cs.LG

Abstract: Proactive approaches to security, such as adversary emulation, leverage information about threat actors and their techniques (Cyber Threat Intelligence, CTI). However, most CTI still comes in unstructured forms (i.e., natural language), such as incident reports and leaked documents. To support proactive security efforts, we present an experimental study on the automatic classification of unstructured CTI into attack techniques using ML. We contribute with two new datasets for CTI analysis, and we evaluate several ML models, including both traditional and deep learning-based ones. We present several lessons learned about how ML can perform at this task, which classifiers perform best and under which conditions, which are the main causes of classification errors, and the challenges ahead for CTI analysis.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Vittorio Orbinato (7 papers)
  2. Mariarosaria Barbaraci (2 papers)
  3. Roberto Natella (42 papers)
  4. Domenico Cotroneo (36 papers)
Citations (15)