Affiliation:
1. PEASEC, Technical University of Darmstadt, Darmstadt, Germany
Abstract
The field of cysec is evolving fast. Security professionals are in need of intelligence on past, current and —ideally — upcoming threats, because attacks are becoming more advanced and are increasingly targeting larger and more complex systems. Since the processing and analysis of such large amounts of information cannot be addressed manually, cysec experts rely on machine learning techniques. In the textual domain, pre-trained language models such as Bidirectional Encoder Representations from Transformers (BERT) have proven to be helpful as they provide a good baseline for further fine-tuning. However, due to the domain-knowledge and the many technical terms in cysec, general language models might miss the gist of textual information. For this reason, we create a high-quality dataset
1
and present a language model
2
specifically tailored to the cysec domain that can serve as a basic building block for cybersecurity systems. The model is compared on 15 tasks: Domain-dependent extrinsic tasks for measuring the performance on specific problems, intrinsic tasks for measuring the performance of the internal representations of the model, as well as general tasks from the SuperGLUE benchmark. The results of the intrinsic tasks show that our model improves the internal representation space of domain words compared with the other models. The extrinsic, domain-dependent tasks, consisting of sequence tagging and classification, show that the model performs best in cybersecurity scenarios. In addition, we pay special attention to the choice of hyperparameters against catastrophic forgetting, as pre-trained models tend to forget the original knowledge during further training.
Funder
German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts
National Research Center for Applied Cybersecurity ATHENE
German Federal Ministry for Education and Research
CYLENCE
Publisher
Association for Computing Machinery (ACM)
Reference53 articles.
1. Cyber warfare in the Russo-Ukrainian war: Assessment and implications;Eun Song Tae;Institute of Foreign Affairs and National Security,2022
2. Eoin Hinchy. 2022. Voice of the SOC Analyst. Technical Report. Tines. 39 pages. Retrieved from https://www.tines.com/reports/voice-of-the-soc-analyst/
3. Death to the IOC: What’s Next in Threat Intelligence;Soman Bhavna;https://www.blackhat.com/us-19/briefings/schedule/#death-to-the-ioc-whats-next-in-threat-intelligence-15392,2019
4. Cyber threat intelligence sharing: Survey and research directions
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献