Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management (2212.10388v2)

Published 20 Dec 2022 in cs.CR and cs.DB

Abstract: Open-source cyber threat intelligence (OSCTI) has become essential for keeping up with the rapidly changing threat landscape. However, current OSCTI gathering and management solutions mainly focus on structured Indicators of Compromise (IOC) feeds, which are low-level and isolated, providing only a narrow view of potential threats. Meanwhile, the extensive and interconnected knowledge found in the unstructured text of numerous OSCTI reports (e.g., security articles, threat reports) available publicly is still largely underexplored. To bridge the gap, we propose ThreatKG, an automated system for OSCTI gathering and management. ThreatKG efficiently collects a large number of OSCTI reports from multiple sources, leverages specialized AI-based techniques to extract high-quality knowledge about various threat entities and their relationships, and constructs and continuously updates a threat knowledge graph by integrating new OSCTI data. ThreatKG features a modular and extensible design, allowing for the addition of components to accommodate diverse OSCTI report structures and knowledge types. Our extensive evaluations demonstrate ThreatKG's practical effectiveness in enhancing threat knowledge gathering and management.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Peng Gao (402 papers)
  2. Xiaoyuan Liu (44 papers)
  3. Edward Choi (90 papers)
  4. Sibo Ma (3 papers)
  5. Xinyu Yang (109 papers)
  6. Dawn Song (229 papers)
Citations (6)

Summary

We haven't generated a summary for this paper yet.