Understanding attack trends from security blog posts using guided-topic model
Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145593 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-145593 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1455932023-02-28T19:54:45Z Understanding attack trends from security blog posts using guided-topic model Nagai, Tatsuya Takita, Makoto Furumoto, Keisuke Shiraishi, Yoshiaki Xia, Kelin Takano, Yasuhiro Mohri, Masami Morii, Masakatu School of Physical and Mathematical Sciences Science::Mathematics Security Blog Posts Topic Model Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are useful for help in responding to a cyber security incident. However, it is difficult to collect threat information from multiple sources such as security blog posts. In this paper, we propose a method to efficiently collect information from the relationship between words using SeededLDA. In our case studies, we visualize the relationship between the words from security blog posts which were published in 2017 by eight security vendors, and demonstrate how our method helps to understand threat trends in the IoT industry and financial institutions. Published version 2020-12-30T01:36:14Z 2020-12-30T01:36:14Z 2019 Journal Article Nagai, T., Takita, M., Furumoto, K., Shiraishi, Y., Xia, K., Takano, Y., . . . Morii, M. (2019). Understanding attack trends from security blog posts using guided-topic model. Journal of Information Processing, 27, 802-809. doi:10.2197/ipsjjip.27.802 1882-6652 https://hdl.handle.net/10356/145593 10.2197/ipsjjip.27.802 27 802 809 en Journal of Information Processing Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web page with the agreement of the author(s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address Publication Section, please. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics Security Blog Posts Topic Model |
spellingShingle |
Science::Mathematics Security Blog Posts Topic Model Nagai, Tatsuya Takita, Makoto Furumoto, Keisuke Shiraishi, Yoshiaki Xia, Kelin Takano, Yasuhiro Mohri, Masami Morii, Masakatu Understanding attack trends from security blog posts using guided-topic model |
description |
Organizations are plagued by sophisticated and diversified cyber attacks. In order to prevent such attacks, it is necessary to understand threat trends and to take measures to protect their assets. Security vendors publish reports which contain threat trends or analysis of malware. These reports are useful for help in responding to a cyber security incident. However, it is difficult to collect threat information from multiple sources such as security blog posts. In this paper, we propose a method to efficiently collect information from the relationship between words using SeededLDA. In our case studies, we visualize the relationship between the words from security blog posts which were published in 2017 by eight security vendors, and demonstrate how our method helps to understand threat trends in the IoT industry and financial institutions. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Nagai, Tatsuya Takita, Makoto Furumoto, Keisuke Shiraishi, Yoshiaki Xia, Kelin Takano, Yasuhiro Mohri, Masami Morii, Masakatu |
format |
Article |
author |
Nagai, Tatsuya Takita, Makoto Furumoto, Keisuke Shiraishi, Yoshiaki Xia, Kelin Takano, Yasuhiro Mohri, Masami Morii, Masakatu |
author_sort |
Nagai, Tatsuya |
title |
Understanding attack trends from security blog posts using guided-topic model |
title_short |
Understanding attack trends from security blog posts using guided-topic model |
title_full |
Understanding attack trends from security blog posts using guided-topic model |
title_fullStr |
Understanding attack trends from security blog posts using guided-topic model |
title_full_unstemmed |
Understanding attack trends from security blog posts using guided-topic model |
title_sort |
understanding attack trends from security blog posts using guided-topic model |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/145593 |
_version_ |
1759853875882360832 |