Threat Analysis Using Topic Models in Large-Scale Vulnerability Databases and Security Incident Case Documents
It is crucial to design products bearing security in mind from the initial development stage. Consequently, many threat analysis support tools have been developed. However, it is difficult to determine the inherent threats in various designed documents written in natural language, which is used in t...
Saved in:
Published in: | 2021 IEEE International Symposium on Technologies for Homeland Security (HST) pp. 1 - 6 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
08-11-2021
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | It is crucial to design products bearing security in mind from the initial development stage. Consequently, many threat analysis support tools have been developed. However, it is difficult to determine the inherent threats in various designed documents written in natural language, which is used in the initial development stage. It is not uncommon to find attacks that closely resemble past attacks. In addition, many designs are limited in the number of data they can handle. We propose a method of extracting existing vulnerabilities similar to those used in the attack by collating a large vulnerability database with existing attack cases using Latent Dirichlet Allocation, one of the topic model methods. We apply the proposed method to several cases and verify its effectiveness. |
---|---|
DOI: | 10.1109/HST53381.2021.9619846 |