{"title":"Survey of Research on Named Entity Recognition in Cyber Threat Intelligence","authors":"Keke Zhang, Xu Chen, Yongjun Jing, Shuyang Wang, Lijun Tang","doi":"10.1109/SmartCloud55982.2022.00017","DOIUrl":null,"url":null,"abstract":"Facing the complex network security environment, it is particularly important to quickly obtain the latest network threat intelligence to identify, block and track network attacks. How to obtain network threat intelligence data has become a key research content. Named entity recognition (NER) technology provides ideas to solve this problem. Firstly, this paper summarizes the methods of named entity recognition, then introduces the research status of NER in the field of Chinese, then introduces the latest research results of NER in the field of network security, and finally summarizes the challenges encountered in related tasks and the prospect of future research.","PeriodicalId":104366,"journal":{"name":"2022 IEEE 7th International Conference on Smart Cloud (SmartCloud)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 7th International Conference on Smart Cloud (SmartCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartCloud55982.2022.00017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Facing the complex network security environment, it is particularly important to quickly obtain the latest network threat intelligence to identify, block and track network attacks. How to obtain network threat intelligence data has become a key research content. Named entity recognition (NER) technology provides ideas to solve this problem. Firstly, this paper summarizes the methods of named entity recognition, then introduces the research status of NER in the field of Chinese, then introduces the latest research results of NER in the field of network security, and finally summarizes the challenges encountered in related tasks and the prospect of future research.