2015
DOI: 10.1007/978-3-319-19686-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-Driven Data Semantics Discovery for Cyber-Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…iACE uses a set of regular expressions and common context terms extracted from iocterms to identify the IOC tokens, such as IP and MD5 string. Balduccini et al [18] design a set of regular expressions for matching each entity contained in the file of cyber assets. However, due to the unstructured characteristics and diversity of many security entities, it is very difficult to construct rules for all these types of entity.…”
Section: A Rule-based Entity Extraction Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…iACE uses a set of regular expressions and common context terms extracted from iocterms to identify the IOC tokens, such as IP and MD5 string. Balduccini et al [18] design a set of regular expressions for matching each entity contained in the file of cyber assets. However, due to the unstructured characteristics and diversity of many security entities, it is very difficult to construct rules for all these types of entity.…”
Section: A Rule-based Entity Extraction Methodsmentioning
confidence: 99%
“…The rule-based methods can extract named entity with good accuracy in a simple manner when the to-be-extracted information follows regular speech patterns such as email address, host IP, and Common Vulnerabilities and Exposures (CVE) [17], [18]. However, these methods are not suitable for complex situations while to-be-extracted entity includes many variations or comes from irregular structured text, which is more in line with the actual situation on the network.…”
Section: Introductionmentioning
confidence: 99%
“…Ontology-Based Data Access (OBDA) systems (see e.g. [13,2]) such as Ontop, allow for semantic queries about an ontology to be interpreted over concrete data -using engines such as NoSQL, Hadoop, MapReduce and so forth. This is achieved through mappings that mediate between the semantic layer of ontologies and the concrete data.…”
Section: Related Workmentioning
confidence: 99%
“…where the first rule states that any property π can be true or false 2 and the second says that holds(γ, 0) must be true in every solution/answer returned. For illustration, let us complete the partial design: obs(basicOne, true), obs(cam boot[sec], true), obs(cam[rate25fps], false), obs(SAM mem[encr], true), obs(SAM boot[sec], true).…”
Section: Reasoningmentioning
confidence: 99%
“…Thus, NER in CTI plays a major role in supporting and achieving cybersecurity research. Researches about NER in CTI have been widely pursued in recent years, and they can be summarized in the following three categories: rules-based [2], [3], [4], [5], [6], statistical characteristicsbased [7], [8], [9], [10], [11] and deep learning-based [12], [13], [14], [15], [16], [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%