2019
DOI: 10.3390/s19153380
|View full text |Cite
|
Sign up to set email alerts
|

Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks

Abstract: The aim of this paper was to enhance the process of diagnosing and detecting possible vulnerabilities within an Internet of Things (IoT) system by using a named entity recognition (NER)-based solution. In both research and practice, security system management experts rely on a large variety of heterogeneous security data sources, which are usually available in the form of natural language. This is challenging as the process is very time consuming and it is difficult to stay up to date with the constant finding… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…The most widely used techniques in NLP are entity recognition (NER), word sense disambiguation, natural language generation, etc. For example, a NER-based automated system [172], can be used to diagnose cybersecurity situations in IoT networks.…”
Section: Nlp-based Modelingmentioning
confidence: 99%
“…The most widely used techniques in NLP are entity recognition (NER), word sense disambiguation, natural language generation, etc. For example, a NER-based automated system [172], can be used to diagnose cybersecurity situations in IoT networks.…”
Section: Nlp-based Modelingmentioning
confidence: 99%
“…The implementation must take into account the ease, usability, and usefulness of cyber monitoring and control systems. While commercially available cybersecurity platforms facilitate the development of monitoring and control systems, these platforms can limit the developer in terms of customization of the solution [81]. The decision on the new IoT cyber infrastructure also needs to take into account the types of IoT applications and devices; e.g., some of the IoT devices are too small to implement computation-intensive cybersecurity algorithms directly on their devices, so a gateway-based architecture may be used to protect the entire IoT network as well as devices [82].…”
Section: Methodsmentioning
confidence: 99%
“…Errors during the machine labelling of entities on the test set frequently occurred in cases of annotated phrases and compound mentions, whereas single word entities performed above average. This was most likely due to the model's need for a larger amount of training data to reliably identify more complex linguistic patterns based on the applied techniques of DL and NLP [7].…”
Section: Model Performance Evaluationmentioning
confidence: 99%