Semantic Ranking for Automated Adversarial Technique Annotation in Security Text

Udesh Kumarasinghe, Ahmed Lekssays,Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala,Preslav Nakov

arxiv(2024)

引用 0|浏览2
暂无评分
摘要
We introduce a new method for extracting structured threat behaviors from threat intelligence text. Our method is based on a multi-stage ranking architecture that allows jointly optimizing for efficiency and effectiveness. Therefore, we believe this problem formulation better aligns with the real-world nature of the task considering the large number of adversary techniques and the extensive body of threat intelligence created by security analysts. Our findings show that the proposed system yields state-of-the-art performance results for this task. Results show that our method has a top-3 recall performance of 81% in identifying the relevant technique among 193 top-level techniques. Our tests also demonstrate that our system performs significantly better (+40%) than the widely used large language models when tested under a zero-shot setting.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要