RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi James Holt, and Richard Zak University of Maryland, Baltimore County, Baltimore, MD 21250, USA Laboratory for Physical Sciences fadiping1, apiplai1, smittal1,
[email protected] fholt,
[email protected] Abstract—Security Analysts that work in a ‘Security Opera- cybersecurity reports, CVE [21], CWE [22], National Vul- tions Center’ (SoC) play a major role in ensuring the security nerability Datasets [28], and any cybersecurity text publicly of the organization. The amount of background knowledge they available. Various SIEM systems, fetch, process, and store have about the evolving and new attacks makes a significant difference in their ability to detect attacks. Open source threat much of the cyber threat intelligence available through OSINT intelligence sources, like text descriptions about cyber-attacks, sources. Knowledge Graphs (KG) specifically to store cyber can be stored in a structured fashion in a cybersecurity knowl- threat intelligence has been used by many cybersecurity in- edge graph. A cybersecurity knowledge graph can be paramount formatics systems. These cybersecurity knowledge graphs can in aiding a security analyst to detect cyber threats because it not only store but are also be able to retrieve data and answer stores a vast range of cyber threat information in the form of semantic triples which can be queried. A semantic triple complex queries asked by the security analysts. contains two cybersecurity entities with a relationship between The dependence of various cybersecurity informatics sys- them. In this work, we propose a system to create semantic tems on various knowledge representation schemes makes triples over cybersecurity text, using deep learning approaches it imperative that we develop systems that improve these to extract possible relationships.