A Natural Language Processing-Based System for Automatically Identifying and Profiling New Cyber Threats
Keywords:
Cyber ThreatsAbstract
More and more, the amount of time that elapses between the discovery of a new cyber vulnerability and its exploitation by cybercriminals is shrinking. This is well shown by recent incidents, such the Log4j vulnerability. Attackers began searching the web for sites that could be
susceptible to the exploit in order to install malware such as bit coin minersand ransom ware on those servers within hours of the vulnerability's announcement.
Downloads
References
Advanced Persistent Threat, 2020. [Online]. Available: https://en.wikipedia.org/wik i/Advanced_persistent_threatInformati on and communication technology.
APT Annual Review, 2021. [Online]. Available: https://securelist.com/apt- annual-review-2021/105127
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.