Title | CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network |
Publication Type | Journal Article |
Year of Publication | 2020 |
Authors | Fang, Yong, Zhang, Yuchi, Huang, Cheng |
Journal | The Computer Journal |
Volume | 64 |
Pagination | 1215–1225 |
Date Published | oct |
ISSN | 1460-2067 |
Keywords | BiLSTM, CRF, cybersecurity corpus, cybersecurity entity recognition, graph convolutional network, non-local dependencies |
Abstract | Cybersecurity has gradually become the public focus between common people and countries with the high development of Internet technology in daily life. The cybersecurity knowledge analysis methods have achieved high evolution with the help of knowledge graph technology, especially a lot of threat intelligence information could be extracted with fine granularity. But named entity recognition (NER) is the primary task for constructing security knowledge graph. Traditional NER models are difficult to determine entities that have a complex structure in the field of cybersecurity, and it is difficult to capture non-local and non-sequential dependencies. In this paper, we propose a cybersecurity entity recognition model CyberEyes that uses non-local dependencies extracted by graph convolutional neural networks. The model can capture both local context and graph-level non-local dependencies. In the evaluation experiments, our model reached an F1 score of 90.28% on the cybersecurity corpus under the gold evaluation standard for NER, which performed better than the 86.49% obtained by the classic CNN-BiLSTM-CRF model. |
Notes | Conference Name: The Computer Journal |
DOI | 10.1093/comjnl/bxaa141 |
Citation Key | fang_cybereyes_2020 |