A Deep Learning Approach for Ontology Enrichment from Unstructured Text

12/16/2021
by   Lalit Mohan Sanagavarapu, et al.
0

Information Security in the cyber world is a major cause for concern, with a significant increase in the number of attack surfaces. Existing information on vulnerabilities, attacks, controls, and advisories available on the web provides an opportunity to represent knowledge and perform security analytics to mitigate some of the concerns. Representing security knowledge in the form of ontology facilitates anomaly detection, threat intelligence, reasoning and relevance attribution of attacks, and many more. This necessitates dynamic and automated enrichment of information security ontologies. However, existing ontology enrichment algorithms based on natural language processing and ML models have issues with contextual extraction of concepts in words, phrases, and sentences. This motivates the need for sequential Deep Learning architectures that traverse through dependency paths in text and extract embedded vulnerabilities, threats, controls, products, and other security-related concepts and instances from learned path representations. In the proposed approach, Bidirectional LSTMs trained on a large DBpedia dataset and Wikipedia corpus of 2.8 GB along with Universal Sentence Encoder is deployed to enrich ISO 27001-based information security ontology. The model is trained and tested on a high-performance computing (HPC) environment to handle Wiki text dimensionality. The approach yielded a test accuracy of over 80 tested with knocked-out concepts from ontology and web page instances to validate the robustness.

READ FULL TEXT
research
02/08/2021

OntoEnricher: A Deep Learning Approach for Ontology Enrichment from Unstructured Text

Information Security in the cyber world is a major cause for concern, wi...
research
08/04/2023

Text2KGBench: A Benchmark for Ontology-Driven Knowledge Graph Generation from Text

The recent advances in large language models (LLM) and foundation models...
research
05/07/2019

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Security Analysts that work in a `Security Operations Center' (SoC) play...
research
06/30/2023

An automated method for the ontological representation of security directives

Large documents written in juridical language are difficult to interpret...
research
04/03/2013

Predicting Network Attacks Using Ontology-Driven Inference

Graph knowledge models and ontologies are very powerful modeling and re ...
research
02/10/2010

Dire n'est pas concevoir

The conceptual modelling built from text is rarely an ontology. As a mat...

Please sign up or login with your details

Forgot password? Click here to reset