Skip to main content
SHARE
Publication

Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors...

by Robert A Bridges, Kelly M Huffer, Corinne L Jones, Michael Iannacone, John R Goodall
Publication Type
Conference Paper
Book Title
2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)
Publication Date
Page Numbers
437 to 442
Conference Name
IEEE International Conference on Machine Learning and Applications (ICMLA)
Conference Location
Cancun, Mexico
Conference Sponsor
DHS
Conference Date
-

We address a crucial element of applied information extraction—accurate identification of basic security entities in text-—by evaluating previous methods and presenting new labelers. Our survey reveals that the previous efforts have not been tested on documents similar to the targeted sources (news articles, blogs, tweets, etc.) and that no sufficiently large publicly available annotated corpus of these documents exists. By assembling a representative test corpus, we perform a quantitative evaluation of previous methods in a realistic setting, revealing an overall lack of recall, and giving insight to the models' beneficial and inhibiting elements. In particular, our results show that many previous efforts overfit to the non-representative test corpora in this domain. Informed by this evaluation, we present three novel cyber entity extractors, which seek to leverage the available labeled data but remain worthwhile on the more diverse documents encountered in the wild. Each new model increases the state of the art in recall, with maximal or near maximal F1 score. Our results establish that the state of the art in cyber entity tagging is characterized by F1 = 0.61.