Due to effective incident discovery and response, organizations need to have intelligence about cyber threats and vulnerabilities related themselves. Although documents on the WEB contain various intelligence, these documents are unstructured. Therefore it is difficult to obtain necessary intelligence.
In this presentation, we introduce an automated method to extract structured threat and vulnerability intelligence from unstructured open source documents, and we share experiences and knowledge learned from research and development of our prototype system.
Bohemia Ballroom Borderless Cyber Conference and Technical Symposium / 6-8 Dec 2017 / Prague events@oasis-open.orgDue to effective incident discovery and response, organizations need to have intelligence about cyber threats and vulnerabilities related themselves. Although documents on the WEB contain various intelligence, these documents are unstructured. Therefore it is difficult to obtain necessary intelligence.
In this presentation, we introduce an automated method to extract structured threat and vulnerability intelligence from unstructured open source documents, and we share experiences and knowledge learned from research and development of our prototype system.