{"title":"Automation of Open Sources Data Processing for the Security Assessment","authors":"M. Poltavtseva, D.A. Bazarnova","doi":"10.1109/IVMEM.2019.00016","DOIUrl":null,"url":null,"abstract":"The work is devoted to the automation of security assessment on the basis of open source data. The authors analyzed the work in this area and considered problems of the popular search engines use for automatic data collection and determining the attacker awareness. The authors use data analysis using Named Entity recognition The article presents the developed parameters of the recognition system and the training sample. It presents a data search and processing method and analysis of its effectiveness in detecting in open sources the software and hardware names, where the software or hardware belongs to the organization or object.","PeriodicalId":166102,"journal":{"name":"2019 Ivannikov Memorial Workshop (IVMEM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Ivannikov Memorial Workshop (IVMEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IVMEM.2019.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The work is devoted to the automation of security assessment on the basis of open source data. The authors analyzed the work in this area and considered problems of the popular search engines use for automatic data collection and determining the attacker awareness. The authors use data analysis using Named Entity recognition The article presents the developed parameters of the recognition system and the training sample. It presents a data search and processing method and analysis of its effectiveness in detecting in open sources the software and hardware names, where the software or hardware belongs to the organization or object.