期刊
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
卷 20, 期 2, 页码 1186-1199出版社
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2022.3151148
关键词
Computer security; Search engines; Information retrieval; Pragmatics; Internet; Indexing; Data visualization; Cybersecurity events; data-driven; information retrieval; pragmatics understanding; search engine; visualization
With the rapid increase of cybersecurity attacks and their significant impact, the amount of cybersecurity-related information has surged. This article proposes an innovative cybersecurity retrieval scheme that uses semantic contents and hidden metadata for automatic indexing and searching of cybersecurity information. A novel cybersecurity search engine is implemented to demonstrate effective and understandable retrieval based on the proposed schema. Comprehensive performance evaluation is conducted on real-world datasets to validate the algorithms and techniques developed for cybersecurity information retrieval. This new engine enables augmented search, cybersecurity analytics, and visualization, aiming to provide direct and efficient results for obtaining and truly understanding cybersecurity information.
The amount of cybersecurity-related information is extraordinarily increasing, given the fast-growing number of cybersecurity attacks and the significant influence brought by them. How to efficiently obtain and precisely understand the relevant knowledge in the sea of information on cybersecurity becomes a challenge. In this article, we propose an innovative cybersecurity retrieval scheme that supports automatic indexing and searching of cybersecurity information based on semantic contents and hidden metadata. The proposed scheme leverages a customized neural model that incorporates new linguistic features and word embedding by identifying the entities related to cybersecurity incidents from the text. We implement a novel cybersecurity search engine to demonstrate effective, understandable and pragmatic cybersecurity information retrieval based on the proposed schema. Comprehensive performance evaluation over real-world datasets has been conducted to validate the new algorithms and techniques developed for cybersecurity information retrieval. The new engine makes it possible to conduct augmented search, cybersecurity analytics, and visualization, with the ultimate goal of providing direct and efficient results to help people obtain and truly understand cybersecurity information.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据