{"title":"Open source threat intelligence discovery based on topic detection","authors":"Dong Li, Xiao Zhou, Ao Xue","doi":"10.1109/ICCCN49398.2020.9209602","DOIUrl":null,"url":null,"abstract":"This paper analyzes open source threat data and identity emerging threat topics in real time. Based on the general topic detection technology, this paper deeply studies the feature extraction method in the security field. This paper studies the keyword feature extraction and entity feature extraction method. The experimental results show that the accuracy and F value of the proposed method are all above 0.98.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN49398.2020.9209602","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper analyzes open source threat data and identity emerging threat topics in real time. Based on the general topic detection technology, this paper deeply studies the feature extraction method in the security field. This paper studies the keyword feature extraction and entity feature extraction method. The experimental results show that the accuracy and F value of the proposed method are all above 0.98.