Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July 2023, Volume 38 Issue 3
    Article

    SELECTING FITTING MACHINE LEARNING METHODS TO CONSTRUCT A HYBRID CYBER THREAT INTELLIGENCE MODEL
    Alemayehu Tilahun Haile1, Surafel Lemma2, Henock Mulugeta3,
    Journal of Data Acquisition and Processing, 2023, 38 (3): 6603-6615 . 

    Abstract

    With the rising sophistication of cyber threats, the utilization of machine learning algorithms for cyber threat intelligence (CTI) has become increasingly crucial. This research presents a comprehensive comparative analysis of various deep learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), and Bidirectional Encoder Representations from Transformers (BERT), in the context of CTI using open-source intelligence (OSINT) data. A specific dataset encompassing NER, sentiment analysis, text classification, and information extraction tasks was employed to evaluate the algorithms' performance. The comparison was based on a set of well-established metrics, such as task flexibility, training data requirements, training time, accuracy, precision, and F1-score. The paper results unveiled that while CNN, RNN, and LSTM demonstrated competitive performance in certain tasks, BERT consistently outperformed the other algorithms across multiple metrics and NLP tasks. BERT's superior performance can be attributed to its contextualized word embeddings and advanced attention mechanisms that effectively capture intricate relationships in text.

    Keyword

    Comparative analysis, deep learning algorithms, cyber threat intelligence, OSINT, NER, LSTM, information extraction, training time, accuracy, BERT.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved
.