Aug. 26, 2022, 1:20 a.m. | Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo

cs.CR updates on arXiv.org arxiv.org

Proactive approaches to security, such as adversary emulation, leverage
information about threat actors and their techniques (Cyber Threat
Intelligence, CTI). However, most CTI still comes in unstructured forms (i.e.,
natural language), such as incident reports and leaked documents. To support
proactive security efforts, we present an experimental study on the automatic
classification of unstructured CTI into attack techniques using machine
learning (ML). We contribute with two new datasets for CTI analysis, and we
evaluate several ML models, including both traditional …

cyber cyber threat cyber threat intelligence intelligence study threat threat intelligence

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Junior Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate Director, Operations Compliance and Investigations Management

@ Legend Biotech | Raritan, New Jersey, United States

Analyst, Cyber Operations Engineer

@ BlackRock | SN6-Singapore - 20 Anson Road

Working Student/Intern/Thesis: Hardware based Cybersecurity Training (m/f/d)

@ AVL | Regensburg, DE