Understanding attack trends from security blog posts using guided-topic model

Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are...

Full description

Saved in:
Bibliographic Details
Main Authors: Nagai, Tatsuya, Takita, Makoto, Furumoto, Keisuke, Shiraishi, Yoshiaki, Xia, Kelin, Takano, Yasuhiro, Mohri, Masami, Morii, Masakatu
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2020
Subjects:
Online Access:https://hdl.handle.net/10356/145593
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-145593
record_format dspace
spelling sg-ntu-dr.10356-1455932023-02-28T19:54:45Z Understanding attack trends from security blog posts using guided-topic model Nagai, Tatsuya Takita, Makoto Furumoto, Keisuke Shiraishi, Yoshiaki Xia, Kelin Takano, Yasuhiro Mohri, Masami Morii, Masakatu School of Physical and Mathematical Sciences Science::Mathematics Security Blog Posts Topic Model Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are useful for help in responding to a cyber security incident. However, it is difficult to collect threat information from multiple sources such as security blog posts. In this paper, we propose a method to efficiently collect information from the relationship between words using SeededLDA. In our case studies, we visualize the relationship between the words from security blog posts which were published in 2017 by eight security vendors, and demonstrate how our method helps to understand threat trends in the IoT industry and financial institutions. Published version 2020-12-30T01:36:14Z 2020-12-30T01:36:14Z 2019 Journal Article Nagai, T., Takita, M., Furumoto, K., Shiraishi, Y., Xia, K., Takano, Y., . . . Morii, M. (2019). Understanding attack trends from security blog posts using guided-topic model. Journal of Information Processing, 27, 802-809. doi:10.2197/ipsjjip.27.802 1882-6652 https://hdl.handle.net/10356/145593 10.2197/ipsjjip.27.802 27 802 809 en Journal of Information Processing Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web page with the agreement of the author(s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address Publication Section, please. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics
Security Blog Posts
Topic Model
spellingShingle Science::Mathematics
Security Blog Posts
Topic Model
Nagai, Tatsuya
Takita, Makoto
Furumoto, Keisuke
Shiraishi, Yoshiaki
Xia, Kelin
Takano, Yasuhiro
Mohri, Masami
Morii, Masakatu
Understanding attack trends from security blog posts using guided-topic model
description Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are useful for help in responding to a cyber security incident. However, it is difficult to collect threat information from multiple sources such as security blog posts. In this paper, we propose a method to efficiently collect information from the relationship between words using SeededLDA. In our case studies, we visualize the relationship between the words from security blog posts which were published in 2017 by eight security vendors, and demonstrate how our method helps to understand threat trends in the IoT industry and financial institutions.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Nagai, Tatsuya
Takita, Makoto
Furumoto, Keisuke
Shiraishi, Yoshiaki
Xia, Kelin
Takano, Yasuhiro
Mohri, Masami
Morii, Masakatu
format Article
author Nagai, Tatsuya
Takita, Makoto
Furumoto, Keisuke
Shiraishi, Yoshiaki
Xia, Kelin
Takano, Yasuhiro
Mohri, Masami
Morii, Masakatu
author_sort Nagai, Tatsuya
title Understanding attack trends from security blog posts using guided-topic model
title_short Understanding attack trends from security blog posts using guided-topic model
title_full Understanding attack trends from security blog posts using guided-topic model
title_fullStr Understanding attack trends from security blog posts using guided-topic model
title_full_unstemmed Understanding attack trends from security blog posts using guided-topic model
title_sort understanding attack trends from security blog posts using guided-topic model
publishDate 2020
url https://hdl.handle.net/10356/145593
_version_ 1759853875882360832